|
|
Product Description
Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
Customers Who Bought This Item Also Bought
- Incident Response & Computer Forensics, Third Edition
- Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
- Introduction to Computer Security
- Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
- Dark Territory: The Secret History of Cyber War
- Intelligence-Driven Incident Response: Outwitting the Adversary
- SPAM NATION
- Hacking: The Art of Exploitation, 2nd Edition
*If this is not the "The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage" product you were looking for, you can check the other results by clicking this link








