Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Cuckoo's Egg Mass Market Paperback – November 1, 1990
| Price | New from | Used from |
|
Audible Audiobook, Unabridged
"Please retry" |
$0.00
| Free with your Audible trial | |
|
Mass Market Paperback
"Please retry" | $8.72 | — | $1.00 |
|
Audio CD, MP3 Audio, Unabridged
"Please retry" | $25.99 | — |
- Kindle
$14.99 Read with Our Free App -
Audiobook
$0.00 Free with your Audible trial - Hardcover
$47.0084 Used from $2.80 6 New from $14.99 3 Collectible from $12.98 - Paperback
$13.4976 Used from $2.05 25 New from $12.95 1 Collectible from $24.00 - Mass Market Paperback
$8.7266 Used from $1.00 3 Collectible from $9.99 - Audio CD
$25.992 New from $25.99
- Print length356 pages
- LanguageEnglish
- PublisherPocket
- Publication dateNovember 1, 1990
- Dimensions4.25 x 1.25 x 7 inches
- ISBN-109780671726881
- ISBN-13978-0671726881
What other items do customers buy after viewing this item?
Editorial Reviews
Amazon.com Review
From Publishers Weekly
Copyright 1990 Reed Business Information, Inc.
From the Publisher
About the Author
Product details
- ASIN : 0671726889
- Publisher : Pocket; Reprint edition (November 1, 1990)
- Language : English
- Mass Market Paperback : 356 pages
- ISBN-10 : 9780671726881
- ISBN-13 : 978-0671726881
- Item Weight : 6.4 ounces
- Dimensions : 4.25 x 1.25 x 7 inches
- Best Sellers Rank: #961,990 in Books (See Top 100 in Books)
- #2,335 in Computer Security & Encryption (Books)
- #4,022 in Business Technology
- #4,758 in Literary Movements & Periods
- Customer Reviews:
About the author

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
The book is an engrossing detective story about how these criminals were tracked down and stopped. Anyone who enjoys a “techno thriller” will enjoy the book. Those in the business will find that hacking is nothing new. This should be required reading for all cybersecurity students and practitioners.
The seller is outstanding. The book was in exactly the condition described, and arrived in approximately half of the time expected. Thank you.
Like is the computer plugged in.
If we are smart and/or lucky we find the cause soon...but often it's not soon.
In 1955, I worked at MIT’s Whirlwind computer when the WEB was being conceived. We kept a daily log of every bug, maintenance task, new cable run, air conditioning, power interrupts and as well as users.
When computer is networked to thousands of computers worldwide whose passwords are easily compromised, how lucky do we need to be to find a bug…especially if it is designed to avoid our attempts.
Finding an intentional (smart) network bug requires hundreds of different isolation setups to narrow its possible cause and source…so you better keep a log of your every move if you want to get “lucky.”
Such was the problem faced by author Stoll to find what each bug appearance had in common, or not…same time? same targets? same on-line duration?
Only a log could keep track these many attempts…and later become The Cuckoo’s Egg an exciting computer detective story that, indeed, tracks a complex search…to get lucky.
Charles Muhle
At the time the events depicted in this book were taking place, I was starting my career as an IT professional. My first assignment involved supporting a Bellcore (Bell Labs) developed application running on AT&T Unix (sorry Cliff, I'm a "heathen" though I appreciate BSD too!). I got to experience working with DEC PDP-11/70s, 11/34s, VAX 8650s, Decwriters, and RP06/RP8x DASD. Some of that stuff was considered dated at the time and by today's standards they are prehistoric. So, I can relate to Cliff's experience, except for the part of having to track down an international spy, LOL. I missed out on that, thank goodness!
I look at this book differently now than I did in 1989. Even if the reader doesn't care about the origins of the Internet or the finer points of Unix system administration and telecommunications, the depiction of the government's response to the situation is interesting and informative. Of note is the revelation that a particular agency was aware of existing security vulnerabilities but did nothing to address them because they were likely exploiting the vulnerabilities themselves.
This time around, I had more interest in the personal drama surrounding the incident. I could more easily identify with, and laugh at, some of the crazy personalities involved. And, I could empathize with Cliff over the disruption it was causing in his personal life. I also appreciate Cliff's commentary on the philosophy and ethics of computing and how a few bad apples can spoil it for everyone. These concepts are still relevant today despite advancements in technology. After all, the weakest link in the system is the same today as it was back then.
I would recommend this book to anyone getting started in Information Technology and to old school Unix guys and gals who have ever fixed a paper jam on a Decwriter.
Top reviews from other countries
Aside from that, this book is his account of discovering and tracking down a hacker who'd gotten into a university mainframe, it's properly old school with terminals, modems and dot matrix printers but it's a heck of a story and worth the investment of your time.
Bonus, the 2nd hand copy I got came with a folded up newspaper article from the original reports of the case!
From the very early days of the internet, long before the world wide web, when nobody took IT security seriously, all those TLA were fighting each other and passing the buck and hackers were learning to exploit weaknesses and lax security. A fascinating read. Enough technical detail to let you know what is happening but simple enough for any layman to understand.
And a warning about lax security procedures that are even more relevant today now that everything is online.
If i was a teacher, lecturer or mentor in Cyber security/Network Security this would be a compulsory read!






