

#9403
Mentioned in 6 episodes
The Cuckoo’s Egg
Tracking a Spy Through the Maze of Computer Espionage
Book • 1989
In this book, Clifford Stoll recounts his unexpected adventure as a computer systems manager at the Lawrence Berkeley National Laboratory.
A 75-cent accounting error leads him to discover an unauthorized user on the system, later identified as a hacker named 'Hunter' who was stealing sensitive military information.
Stoll's one-man investigation involves a high-stakes game of deception, broken codes, satellites, and missile bases, eventually gaining the attention of the CIA. The book details the early days of cybersecurity, the challenges of persuading government agencies to cooperate, and the race against time to safeguard sensitive information from falling into the wrong hands.
A 75-cent accounting error leads him to discover an unauthorized user on the system, later identified as a hacker named 'Hunter' who was stealing sensitive military information.
Stoll's one-man investigation involves a high-stakes game of deception, broken codes, satellites, and missile bases, eventually gaining the attention of the CIA. The book details the early days of cybersecurity, the challenges of persuading government agencies to cooperate, and the race against time to safeguard sensitive information from falling into the wrong hands.
Mentioned by













Mentioned in 6 episodes
Mentioned by 

as an example of a book whose content could be ingested into a knowledge graph for conversational AI.


Chris Benson

63 snips
Explainable AI that is accessible for all humans
Mentioned by ![undefined]()

as a firsthand account of tracking a spy through computer espionage.

Christopher Bailey

46 snips
Manage Projects With pyproject.toml & Explore Polars LazyFrames
Mentioned by ![undefined]()

as historically relevant and still super important in cybersecurity.

Helen Patton

12 snips
The Cyber Canon, ditching the SOC 2, and the weekly enterprise news - Helen Patton - ESW #416
Mentioned by ![undefined]()

in the context of a discussion about the importance of data consistency and the trade-off between having a perfectly correct view versus a useful one.

Jeffrey Fredrick

Learning to Love Inconsistent Data
Recommended by ![undefined]()

for newbies in cybersecurity, detailing a real cyber espionage case.

Rick Howard

Ex Palo Alto Networks CSO Rick Howard on Cybersecurity from First Principles
Mentioned by 

as a book that inspired him to pursue a career in cybersecurity.


Doug Burks

Peeling Back the Network Layers with Doug Burks
Mentioned by ![undefined]()

when discussing cybersecurity breaches and the importance of reducing attack surface.

Tim Junio

E992: The Next Unicorns: Expanse CEO & Co-founder Tim Junio reduces exposure to online threats by providing “attack surface visibility”, shares insights into current threats from China & Russia, potential 2020 election tampering, reasons for cybersecurity optimism & more – E8 of 10-ep miniseries
Mentioned by ![undefined]()

when discussing the origins of cybersecurity as a major concern in the US.

Terrance Cooley

Human Resources in the U.S. Air Force, with Terrance Cooley
Mentioned by 

in the context of cybersecurity and hacking.


Brian McCullough

Fri. 12/20 - Now Apple Joins The Space Race?
Mentioned by ![undefined]()

as a nonfiction example of an idea story, focusing on a cyber criminal case.

Dan Wells

11.10: Idea, as Genre, with Nancy Fulda