AccueilGroupesDiscussionsPlusTendances
Site de recherche
Ce site utilise des cookies pour fournir nos services, optimiser les performances, pour les analyses, et (si vous n'êtes pas connecté) pour les publicités. En utilisant Librarything, vous reconnaissez avoir lu et compris nos conditions générales d'utilisation et de services. Votre utilisation du site et de ses services vaut acceptation de ces conditions et termes.

Résultats trouvés sur Google Books

Cliquer sur une vignette pour aller sur Google Books.

Chargement...

Le Nid de coucou. La longue traque d'un espion dans le labyrinthe de l'espionnage informatique (1989)

par Clifford Stoll

MembresCritiquesPopularitéÉvaluation moyenneDiscussions / Mentions
2,756455,214 (4.09)1 / 29
Before the Internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a seventy-five cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"-a mysterious invader who managed to break into US computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases-a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.… (plus d'informations)
Chargement...

Inscrivez-vous à LibraryThing pour découvrir si vous aimerez ce livre

» Voir aussi les 29 mentions

Anglais (42)  Danois (1)  Hébreu (1)  Allemand (1)  Toutes les langues (45)
Affichage de 1-5 de 45 (suivant | tout afficher)
Worth reading!

Very good. Even years later this book is thought provoking. In addition, it gives a historical view of computing at beginning of the widespread use of the Internet. ( )
  Lewis.Noles | Mar 23, 2024 |
An interesting story but about 150 pages too long for this non-computer guy. I am a proud owner of one of Stoll's Klein bottles. ( )
  podocyte | Feb 25, 2024 |
USA, Californien, 1986
Clifford Stoll er astronom, men hans bevilling er tørret ud og han får i stedet arbejde som systemadministrator på Lawrence Berkeley National Laboratory. En dag i 1986 bemærker han at nogen laver numre med afdelingens VAX installation.

??? ( )
  bnielsen | Oct 15, 2023 |
I found this to be an enjoyable true story of tracking a hacker in the early days if the Internet, setting up alarms, putting in traps, and working with numerous agencies and telcos. It was a bit drawn out at times but I still enjoyed it. Good storytelling from a first person perspective of the hunt. ( )
  gianouts | Jul 5, 2023 |
Maybe a little too concerned with narrating every single step in the process, even the many, many failed attempts that lead nowhere. This comes at the expense of excitement in the middle sections of the book.

But that's a minor complaint, overall this was a really cracking story. I'm really impressed by how well Stoll explained topics in computer science, networking, and security to readers who may very well have never been on a network before, and who may be hearing about hacking for the first time. He did a good job choosing what to simplify, and how, to let readers understand what was going on, while not overwhelming them or talking down to them. Even more impressive given that these intrusion detection techniques were things he invented, so he had no examples to draw from, and not many people around to give him advice.

This book was all the rage in the BBS scene in the 90s, and I didn't read it then. I'm glad I finally got around to it. Maybe the longest time between putting a book on my "to read" pile and then actually reading it: about 30 years. ( )
  adamhindman | Jan 12, 2023 |
Affichage de 1-5 de 45 (suivant | tout afficher)
aucune critique | ajouter une critique
Vous devez vous identifier pour modifier le Partage des connaissances.
Pour plus d'aide, voir la page Aide sur le Partage des connaissances [en anglais].
Titre canonique
Titre original
Titres alternatifs
Date de première publication
Personnes ou personnages
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
Lieux importants
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
Évènements importants
Films connexes
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
Épigraphe
Dédicace
Premiers mots
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
Me, a wizard?
Citations
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
1 11 21 1211 111221 31221 13112211 1113212221 31131211221211 13211311122122111221
Derniers mots
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
Notice de désambigüisation
Directeur de publication
Courtes éloges de critiques
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
Langue d'origine
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
DDC/MDS canonique
LCC canonique

Références à cette œuvre sur des ressources externes.

Wikipédia en anglais (4)

Before the Internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a seventy-five cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"-a mysterious invader who managed to break into US computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases-a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

Aucune description trouvée dans une bibliothèque

Description du livre
Résumé sous forme de haïku

Discussion en cours

Aucun

Couvertures populaires

Vos raccourcis

Évaluation

Moyenne: (4.09)
0.5
1 4
1.5
2 14
2.5 5
3 98
3.5 32
4 259
4.5 21
5 211

Est-ce vous ?

Devenez un(e) auteur LibraryThing.

 

À propos | Contact | LibraryThing.com | Respect de la vie privée et règles d'utilisation | Aide/FAQ | Blog | Boutique | APIs | TinyCat | Bibliothèques historiques | Critiques en avant-première | Partage des connaissances | 204,816,659 livres! | Barre supérieure: Toujours visible