Difference between revisions of "cuckoo"
From Tearle
(→Secondary Sources) |
(→Secondary Sources) |
||
Line 20: | Line 20: | ||
* ACME Klein Bottle | * ACME Klein Bottle | ||
** http://www.kleinbottle.com/ | ** http://www.kleinbottle.com/ | ||
+ | * Presentation by Richard Bejtlich | ||
+ | ** [https://taosecurity.com/bejtlich_doj_cooking_06feb11a.pdf Cooking The Cuckoo's Egg] |
Revision as of 12:15, 8 March 2018
netMCR talk
Primary Sources
- Paper
- Book
- Television Documentary
Secondary Sources
- CTI Summit Keynote - Cliff Stoll - (Still) Stalking the Wily Hacker
- Chris Sander's computer security course
- The Impact of Project RAHAB and the Chaos Computing Congresses (CCC) on the Future of Computer-Network Mediated Espionage: Cuckoo’s Egg Prequel or Perfect Storm?
- ACME Klein Bottle
- Presentation by Richard Bejtlich