Home :: Books :: Literature & Fiction  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction

Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

List Price: $13.95
Your Price: $10.46
Product Info Reviews

<< 1 2 3 4 5 .. 14 >>

Rating: 5 stars
Summary: A classic
Review: A well-written and thoroughly engaging account. Although this book will be most interesting to computer geeks, it is written to be accessible to all readers - technical jargon is kept to a minimum, or clearly explained when necessary. Because the events occurred in the eighties, many of the specifics seem rather dated now, but the basic principles are still relevant.

But the essence of this book is not the technical aspect - it's the very human story of an individual determined to solve a mystery at all costs. Stoll wrestles with adversaries (not only the spy himself, but also unhelpful government agents, his bosses, and even awkward computer systems), finds solutions to his problems (sometimes through cleverness and ingenuity, sometimes through tedious, determined effort), celebrates his victories and comes to terms with his failures, and shows how he has grown from the experience and come to new understandings.

Though Stoll downplays his computer expertise ("I'm an astronomer, not a programmer"), he's clearly a hacker in the truest sense of the word - ingenious, determined, iconoclastic, and a bit of a mystic. Frankly, he seems like a helluva guy, possessed of intellect, integrity, and a clever sense of humor. Perhaps one of the most valuable aspects of the book is the insight it gives into the hacker mindset.

The book occasionally gets repetitive - usually to reinforce the technical concepts for the benefit of general readers - but overall, it's competently written and easy to read. Stoll isn't here to craft award-winning literature; he's here to tell a story, and he does that quite well.

I've read this book several times, and will certainly read it several more times. If you fancy yourself a hacker, or just like a good real-life adventure story, this book is essential reading.

Rating: 5 stars
Summary: Great suspense
Review: I couldn't put this book down. I love it when real life surpasses fictional imagination. The story of Mr. Stoll's discovery of a hacker in his university's computer network, and the international chase that ensued was thrilling. His all-nighters, help from his girlfriend (turned ex-girlfriend by the book's end), and triumphant and happy ending makes for fascinating reading.

I think that this book would make a wonderful movie, even if the technology is way outdated by now. Hollywood -- pay attention.

Rating: 5 stars
Summary: I read this book the week it was released.
Review: I knew Cliff (by e-mail) from computer security work I was involved in at the time with the Fed...I was 18 at the time. I have read and re-read this book at least 20 times and it never wears thin. Cliff knew how to tell the story in laymen's terms as at the time he began his hunt he was one. This was the first well publicized crack and even got its own PBS special. An excellent read and even moreso when one considers that no one knew just how significant an issue computer security would be in the future touching not just those in academia and government, but every day folks.

Rating: 4 stars
Summary: Ton of historical info and several current security concepts
Review: I loved reading about the mid-80s computing environment. I've been in infosec (Unix/IDS and networking) for a few years now but the world in which Stoll operated was vastly different than our internet. However there are several concepts that are huge today in information security that Stoll used/documented 15 years ago. Examples:

1. Diversity in computing. Stoll mentions at least twice that diversity in computing is a defense for worms and human attacks. While one can argue that this is not feasible, this idea certainly isn't contentious enough to fire someone over, which is what just happened to security researcher Dan Geer for saying this (don't cross MS).

2. Honeypots. Stoll created fictitious information on his computer to lure the attacker into looking at that info long enough to get a trace. Not exactly a modern honeypot but pretty close.

3. No cooperation between govt branches. Enough said.

4. BAD PASSWORDS. Most of the attacker's arsenal was plunking away at default accounts with lame passwords. Fast forward 15 years and think about how far we've come.

5. Attackers' ridiculous attempts to justify breaking into someone's systems by claiming they're doing the victim a favor by displaying their security problems.

6. Responsible disclosure of bugs and security holes. Stoll ponders how to do this in the late 80s. It took until 2003 for most ppl to agree to give vendors about 1-3 months notice before going public.

My only complaint was that it gets a little repetative near the end with Stoll calling around and trying to get anyone to help him instead of just leeching info. But if that was boring for me it must have been much worse for him.

Overall a solid book that allows us "youngsters" (born mid-70s or later) a glimse of the centralized computing world, I'm just sorry it took me so long to read it.

Rating: 4 stars
Summary: A classic book
Review: This is a great book.

Cliff Stoll is a great writer and writes an interesting story.

Rating: 5 stars
Summary: Great history, especially compared to today (2003)
Review: Stoll writes a good story, well-documented, factual and credible, in contrast to Masters of Deception (Slatalla and Quittner), which I just panned. He keeps it interesting enough to justify staying up past bedtime...

What's especially interesting is that Stoll is in at the beginning of the internet age, when it's shocking to think that people would betray an open community atmosphere of trust. Today, of course, we're beset with online ads, Spam, viruses, worms and everything else you can think of, and we dare shop on the web only when we see https:// at the top of the screen... so it's quite a different perspective to realize that only fifteen years ago, people routinely left their doors unlocked, figuratively speaking.

Rating: 4 stars
Summary: A very engrossing read.
Review: I find this book a good read. I know it impressed the FBI on computer crime. As someone who has also been a univerity physics department computer person I like it. We need more recognition.

Rating: 3 stars
Summary: Less than meets the eye
Review: It seems like it was just a few years ago that Cliff Stoll's face and opinions were all over the television. Any time a geeky looking scientist was needed on a panel discussion, or to comment on a news item involving technology, there, was Cliff, with his off Luddite notions and bizarre flights of fancy. But that was then.

"Cuckoo's Egg" is an entertaining story about a man's obsession with finding hackers at a time when the idea was still rather novel to most of us. Stoll was, at the time of this book, an unemployed astronomer who found himself in that great dumping ground of underemployed academics, the university computing center. One day he discovered that someone, somewhere, had managed to get unauthorized access to one or more of the machines he looked after. Being a pretty bright guy, and having a job that didn't take up a lot of his metal horsepower, he went on a sort of one-man crusade to track down the intruders.

The story is interesting, perhaps more so to those of us who actually work with computers and networks than to the public at large, and it's told well. As an historical artifact it's interesting; As a technological thriller, it's a minor historical curiosity. In a day when we take for granted being able to immediately connect to computers halfway around the world, it's just not that fascinating anymore.

Rating: 5 stars
Summary: Great read!
Review: If you're in the computer industry, you'll love this book!

Rating: 5 stars
Summary: There are few books that you simply can't put down
Review: and this one is certainly one of those.
This book follows the life of a physicist (Cliff) who can't seem to get any physics done because he's chasing a German hacker working for the KGB for over a year who has been breaking into every freaking military computer (what happened to security?)... Very awesome book, and well written, especially for a physicist! I couldn't put it down for a minute. But I will say that its more for a geekier crowd since it has a lot of technical info as well (but does a great job of explaining it)!


<< 1 2 3 4 5 .. 14 >>

© 2004, ReviewFocus or its affiliates