Access Restriction

Author Stoll, Clifford
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract An astronomer-turned-sleuth traces a German trespasser on our military networks, who slipped through operating system security holes and browsed through sensitive databases. Was it espionage?
Description Affiliation: Lawrence Berkeley aboratory, Berkeley, CA (Stoll, Clifford)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 31
Issue Number 5
Page Count 14
Starting Page 484
Ending Page 497

Open content in new tab

   Open content in new tab
Source: ACM Digital Library