Cuckoo's Egg
کتاب های مرتبط
- اطلاعات
- نقد و بررسی
- دیدگاه کاربران
نقد و بررسی
January 1, 1990
Astrophysicist Stoll's pursuit of a hacker trying to access American computer networks led to the discovery of a West German spy ring. ``A quest that reads with the tension and excitement of a fictional thriller,'' asserted PW . ``Although best appreciated by the computer literate, even illiterates should be able to follow the technical complexities with little difficulty.''
September 1, 1989
A 75-cent discrepancy in billing for computer time led Stoll, an astrophysicist working as a systems manager at a California laboratory, on a quest that reads with the tension and excitement of a fictional thriller. Painstakingly he tracked down a hacker who was attempting to access American computer networks, in particular those involved with national security, and actually reached into an estimated 30 of the 450 systems he attacked. Initially Stroll waged a lone battle, his employers begrudging him the time spent on his search and several government agencies refused to cooperate. But his diligence paid off and in due course it was learned that the hacker, 25-year-old Markus Hess of Hanover, Germany, was involved with a spy ring. Eight members were arrested by the West German authorities but all but one were eventually released. Although the book will be best appreciated by the computer literate, even illiterates should be able to follow the technical complexities with little difficulty. Literary Guild selection.
September 15, 1989
Stoll is an astrophysicist at the Lawrence Berkeley Laboratory who became a computer security expert when his persistence in chasing a computer hacker in West Germany led to the crackdown of an international spy ring. Here, his careful documentation of how he tailed the intruder over a year-long long period reveals for all to see the vulnerability of computer networks, the bureaucratic politics of government agencies, and the irresponsible, damaging actions of hackers. Stoll's interspersal of domestic anecdotes adds a touch of seasoning to the story. Readers who are familiar with computer trojan horses, time bombs, and viruses, and who wish to learn about the "cuckoo's egg," will be delighted with this realistic account. Succinct explanations of computer jargon make the text intelligible for general readers. Recommended for public and academic libraries. Literary Guild selection.-- May Rathbone, Virginia Polytechnic Inst. & State Univ., Blacksburg
Copyright 1989 Library Journal, LLC Used with permission.
دیدگاه کاربران