An astronomer-turned-sleuth traces a German trespasser on our military networks, who slipped through operating system security holes and browsed through sensitive databases. Was it espionage?. © 1988, ACM. All rights reserved.
CITATION STYLE
Stoll, C. (1988). Stalking the wily hacker. Communications of the ACM, 31(5), 484–497. https://doi.org/10.1145/42411.42412
Mendeley helps you to discover research relevant for your work.