Facebook Twitter Pinterest <Einbetten>
  • Alle Preisangaben inkl. USt
Nur noch 5 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
The Cuckoo's Egg: Trackin... ist in Ihrem Einkaufwagen hinzugefügt worden

Lieferort:
Um Adressen zu sehen, bitte
Oder
Bitte tragen Sie eine deutsche PLZ ein.
Oder
Gebraucht: Sehr gut | Details
Verkauft von Warehouse Deals
Zustand: Gebraucht: Sehr gut
Kommentar: Gebrauchsspuren. Schrumpffolie fehlt, Aktivierungscodes für Online-Bonusinhalte können fehlen bzw. abgelaufen sein. Kleiner Fleck oder geringe Abnutzung auf der Vorderseite. Kleine Falte oder kleiner Knick auf der Vorderseite. Kleiner Fleck oder geringe Abnutzung auf der Rückseite. Kleine Falte oder kleiner Knick auf der Rückseite. Kleiner Fleck oder geringe Abnutzung auf dem Buchrücken. Kleine Falte oder kleiner Knick am Buchrücken. Kleiner Fleck oder geringe Abnutzung auf den Seiten. Kleine Falte oder kleiner Knick auf den Seiten. Amazon-Kundenservice und Rücknahmegarantie (bis zu 30 Tagen) bei jedem Kauf.
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Sie hören eine Hörprobe des Audible Hörbuch-Downloads.
Mehr erfahren
Alle 2 Bilder anzeigen

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (Englisch) Taschenbuch – 2005

4.8 von 5 Sternen 63 Kundenrezensionen

Alle 12 Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Preis
Neu ab Gebraucht ab
Taschenbuch
"Bitte wiederholen"
EUR 16,49
EUR 10,73 EUR 2,61
Hörkassette, Audiobook
"Bitte wiederholen"
EUR 194,00
15 neu ab EUR 10,73 14 gebraucht ab EUR 2,61
click to open popover

Wird oft zusammen gekauft

  • The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
  • +
  • The Soul of A New Machine
  • +
  • Where Wizards Stay Up Late: The Origins Of The Internet
Gesamtpreis: EUR 45,47
Die ausgewählten Artikel zusammen kaufen

Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


Produktinformation

Produktbeschreibungen

Amazon.de

A sentimental favorite, The Cuckoo's Egg seems to have inspired a whole category of books exploring the quest to capture computer criminals. Still, even several years after its initial publication and after much imitation, the book remains a good read with an engaging story line and a critical outlook, as Clifford Stoll becomes, almost unwillingly, a one-man security force trying to track down faceless criminals who've invaded the university computer lab he stewards. What first appears as a 75-cent accounting error in a computer log is eventually revealed to be a ring of industrial espionage, primarily thanks to Stoll's persistence and intellectual tenacity. -- Dieser Text bezieht sich auf eine vergriffene oder nicht verfügbare Ausgabe dieses Titels.

Pressestimmen

"Fascinating...a nonfiction account that reads like a le Carré novel."
-- The Seattle Times

"Stoll's is the ever-appealing story of the little man bucking the system...great fun to read...lively and thoroughly absorbing."
-- The Philadelphia Inquirer

"The Cuckoo's Egg is 'reader friendly,' even for those who have only the vaguest familiarity with computers...a true spy thriller....The hunt is gripping."
-- Chicago Tribune

"As exciting as any action novel....A gripping spy thriller."
-- The New York Times Book Review

Alle Produktbeschreibungen

Kundenrezensionen

Top-Kundenrezensionen

Format: Taschenbuch
This was the second computer security book I read and it was like adding flame to a fire because it increased my curiosity and prompted me to want to know more about it, so I ended up reading Cyberpunk by Katie Hafner and John Markoff to get a more inside look. If you start reading it then you'll probably finish it the same day. It talks a scientist that stumbles on a mistake in the accounting part of his job as a scientist at Lawrence Berkely Lab and he makes the mistake into a chase through cyberspace. In the book the author takes on the role as a modern day Sherlock Holmes and in the end he realizes that it was only elementary.
Dealing with the CCC (Chaos Computer Club), Hunter (the main hacker), and the different networks will really make you think and keep you on your toes. Read it and see for yourself just how intense the experience will be. I advise you to get some sleep before you start because you probably won't be getting any anytime soon.
Kommentar 2 Personen fanden diese Informationen hilfreich. War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden
Format: Taschenbuch
This is an exciting and gripping story of a system administrator's life. One day, he discovers a hacker who is constantly breaking in into computer systems. When he begins to chase the hacker, he eventually finds out that it's not just some youth having fun reading other people's files. And you are going to hold your breath while following the administrator's every move.
The book's well written and funny. Its philosophy is somewhat anarchist, as is usual for computer freaks, and pretty ironical towards the US government institutions. I'm glad to say that the hero, looking like just another leftist jerk in the beginning, goes through a significant attitude change when he realizes that there are countries much more evil than the United States of America.
Kommentar 2 Personen fanden diese Informationen hilfreich. War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden
Format: Taschenbuch
This book suceeds on many levels. Its a well written suspenseful spy novel that evolves very smoothly and engages the reader very early on. It is also an excellent description of computer / telecommunications technology that most anyone can understand, since he goes to the trouble to stop and explain, in laymens terms, UNIX utilities, daemon outputs, satellite technology, and microwave-oven protocol (check out the sneaker-melting fiasco on p 269). Stoll proves to be hell-bent on capturing the rogue user despite the lack of support from superiors and government agencies, and the toll it takes on his personal life. His frustrated accounts of his treatment at the hands of federal agencies as he petitions assistance from the FBI, the CIA, the NSA (among others) in capturing this potentially dangerous mole are testaments to the power of beaucracy in this country. However, he still manages to humanize the employees of these otherwise caricatured federal agencies by describing them as real people who want to help, rather than just surly trench-coated spies. I especially enjoyed reading about Stoll's low-tech solutions to slowing the hacker as he rifled through delicate documents by jangling keys over the connector to resemble static (simply cutting the line would have tipped the hacker off). This is a very enjoyable book, and I'd also recommend the reader try to find a videocassette copy of the NOVA TV special on PBS. Although it loses a lot of the book's details in the attempt to condense into one hour, it allows the viewer to see and hear the author, one of the quirkiest, most entertaining techno-goobers you'll come across.
Kommentar Eine Person fand diese Informationen hilfreich. War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden
Format: Taschenbuch
This is a story of a young astronomer who was ignoring his proper
job and playing with computers too much, who discovered some alarming
hacking into US defence computers and decided to track down the
culprits.

Stoll is a persistent thoughful and imaginative investigator and
occasionally puts his scientific training to good use, for example
when he theorises on the location of the hackers based on their
network latency.

I found this utterly enthralling, and it is the only book where I
have literally read it through from start to finish unable to put it
down, which in my case meant getting to bed at 5.30 in the morning.

As well as a fascinating story of hacking and detection, the book
contains wry anecdotes of the total gulf between Unix, VMS and Apple
Mac users. Although the story is 10 years old, these attitudes still
prevail to this day. And of course Unix still RULES!!!!

The age of the story is revealed when a mini-computer is described
as being powerful because it musters 10 MIPS. These days that won't
support a mail program :-)

The book also relates in intimate detail the dreadful buck-passing
that went on for months before the US powers finally did something.

Interspersed with the main story are some bits and pieces of
Stoll's own life and this reader found it a little sad how he devoted
so much time to catching the hackers whilst fully aware that his
girlfriend was missing him at home, and then in a wistful series of
postscripts we learn they split up - perhaps there was some
connection.

This is the best of all of these books on computer crime - a must!
Kommentar Eine Person fand diese Informationen hilfreich. War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden

Die neuesten Kundenrezensionen