New paradigms in incident management
Proceedings of the 2000 workshop on New security paradigms
Proceedings of the 10th ACM conference on Computer and communications security
The loop fallacy and serialization in tracing intrusion connections through stepping stones
Proceedings of the 2004 ACM symposium on Applied computing
Enabling email confidentiality through the use of opportunistic encryption
dg.o '03 Proceedings of the 2003 annual national conference on Digital government research
International Journal of Security and Networks
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Hi-index | 0.00 |
From the Publisher:Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"a mystery invader hiding inside a twisting electronic labyrinth, breaking into U.S. computer systems and stealing sensitive military and security information. Stoll began a one-man hunt of his own, spying on the spyand plunged into an incredible international probe that finally gained the attention of top U.S. counterintelligence agents. The Cookoo's Egg is his wild and suspenseful true storya year of deception, broken codes, satellites, missile bases, and the ultimate sting operationand how one ingenious American trapped a spy ring paid in cash and cocaine, and reporting to the KGB.