CUCKOO'S EGG and over one million other books are available for Amazon Kindle. Learn more
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Cuckoo's Egg Mass Market Paperback – Print, November 1, 1990


See all 20 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle
"Please retry"
Mass Market Paperback, Print
"Please retry"
$2.89 $0.01
Unknown Binding
"Please retry"
$5.50
12%20Days%20of%20Deals%20in%20Books
NO_CONTENT_IN_FEATURE

Best Books of the Year
Best Books of 2014
Looking for something great to read? Browse our editors' picks for 2014's Best Books of the Year in fiction, nonfiction, mysteries, children's books, and much more.

Product Details

  • Mass Market Paperback: 356 pages
  • Publisher: Pocket; Reprint edition (November 1, 1990)
  • Language: English
  • ISBN-10: 0671726889
  • ISBN-13: 978-0671726881
  • Product Dimensions: 6.7 x 4.2 x 1 inches
  • Shipping Weight: 4.8 ounces
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (294 customer reviews)
  • Amazon Best Sellers Rank: #143,495 in Books (See Top 100 in Books)

Editorial Reviews

Amazon.com Review

A sentimental favorite, The Cuckoo's Egg seems to have inspired a whole category of books exploring the quest to capture computer criminals. Still, even several years after its initial publication and after much imitation, the book remains a good read with an engaging story line and a critical outlook, as Clifford Stoll becomes, almost unwillingly, a one-man security force trying to track down faceless criminals who've invaded the university computer lab he stewards. What first appears as a 75-cent accounting error in a computer log is eventually revealed to be a ring of industrial espionage, primarily thanks to Stoll's persistence and intellectual tenacity.

From Publishers Weekly

Astrophysicist Stoll's pursuit of a hacker trying to access American computer networks led to the discovery of a West German spy ring. "A quest that reads with the tension and excitement of a fictional thriller," asserted PW . "Although best appreciated by the computer literate, even illiterates should be able to follow the technical complexities with little difficulty."
Copyright 1990 Reed Business Information, Inc.

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

All in all, very well written book.
Nick Garvey
I highly recommend it to anyone with an interest in computers, hacking, security or technology.
Alex
When I started reading this book, I could not put it down.
Ralph Janke

Most Helpful Customer Reviews

47 of 51 people found the following review helpful By frumiousb VINE VOICE on September 24, 2002
Format: Paperback Verified Purchase
_The Cuckoo's Egg_ has everything most fictional detective novels wish that they had: a personable detective who does not mean to get involved as deeply as he does, federal agencies who cannot seem to take action, and a criminal mastermind who has everybody stumped until he encounters our detective. The best part of this whole book is that it really happened-- a feat that fictional mysteries can never match.

I knew Stoll's work through the more technical article "Stalking the Wily Hacker" and was pleasantly surprised to see how well Stoll was able to translate the technical side into a book-length narrative. IMO, this is significantly better than other more recent books about computer crime and still worth a read today (both for information and entertainment). Highly recommended.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
23 of 24 people found the following review helpful By Charles Ashbacher HALL OF FAMETOP 500 REVIEWERVINE VOICE on October 26, 2002
Format: Paperback
It starts with a 75-cent discrepancy in an account for computer time and ends with the arrest of a small group of German hackers. The journey from this start to the end is one of the most amazing in all of computing. Along the way, it involves the National Security Agency, the Federal Bureau of Investigation, the Central Intelligence Agency, the National Aeronautics and Space Administration, all branches of the United States military and the Soviet KGB. Fortunately, in the end the good guys emerge victorious, but it is hard to feel very comfortable about it.
This is a story about unauthorized access into computers, where the trespassers are after military and economic data. All information considered of value is sent to the Soviet KGB in exchange for money and drugs. A major undercurrent of the story is the lack of cooperation between the American federal agencies and how they refuse to commit themselves to anything. In the aftermath of the tragedy of 9-11, this is unsettling, as it appears that the lack of communication between the different agencies is where the real failure occurred on that terrible day.
Cliff Stoll is a combination computer programmer and astronomer who was the primary actor in the events that led to the apprehension of the hackers. A self-admitted California hippie type, he started being anti-government and yet ended up lecturing to some of the most governmental of institutions. In the end, he gives some of the best arguments as to why unauthorized access to computers is a serious crime. As a scientist, he understands how all benefit from the free flow of information and mutual trust and how hackers destroy that, forcing all into a state of perpetual paranoia.
This is one of the best popular books on computing that has ever been written.
Read more ›
3 Comments Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
41 of 46 people found the following review helpful By Nick on December 13, 1999
Format: Mass Market Paperback
This was the second computer security book I read and it was like adding flame to a fire because it increased my curiosity and prompted me to want to know more about it, so I ended up reading Cyberpunk by Katie Hafner and John Markoff to get a more inside look. If you start reading it then you'll probably finish it the same day. It talks a scientist that stumbles on a mistake in the accounting part of his job as a scientist at Lawrence Berkely Lab and he makes the mistake into a chase through cyberspace. In the book the author takes on the role as a modern day Sherlock Holmes and in the end he realizes that it was only elementary.
Dealing with the CCC (Chaos Computer Club), Hunter (the main hacker), and the different networks will really make you think and keep you on your toes. Read it and see for yourself just how intense the experience will be. I advise you to get some sleep before you start because you probably won't be getting any anytime soon.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
22 of 24 people found the following review helpful By Brendan Murray on November 12, 1997
Format: Mass Market Paperback
This book suceeds on many levels. Its a well written suspenseful spy novel that evolves very smoothly and engages the reader very early on. It is also an excellent description of computer / telecommunications technology that most anyone can understand, since he goes to the trouble to stop and explain, in laymens terms, UNIX utilities, daemon outputs, satellite technology, and microwave-oven protocol (check out the sneaker-melting fiasco on p 269). Stoll proves to be hell-bent on capturing the rogue user despite the lack of support from superiors and government agencies, and the toll it takes on his personal life. His frustrated accounts of his treatment at the hands of federal agencies as he petitions assistance from the FBI, the CIA, the NSA (among others) in capturing this potentially dangerous mole are testaments to the power of beaucracy in this country. However, he still manages to humanize the employees of these otherwise caricatured federal agencies by describing them as real people who want to help, rather than just surly trench-coated spies. I especially enjoyed reading about Stoll's low-tech solutions to slowing the hacker as he rifled through delicate documents by jangling keys over the connector to resemble static (simply cutting the line would have tipped the hacker off). This is a very enjoyable book, and I'd also recommend the reader try to find a videocassette copy of the NOVA TV special on PBS. Although it loses a lot of the book's details in the attempt to condense into one hour, it allows the viewer to see and hear the author, one of the quirkiest, most entertaining techno-goobers you'll come across.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews