The exploit: a theory of networks
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Minneapolis, Minn. ; London
Univ. of Minnesota Press
2007
|
Schriftenreihe: | Electronic mediations
21 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturverz. S. 167 - 180 |
Beschreibung: | VII, 196 S. |
ISBN: | 9780816650439 9780816650446 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV023008162 | ||
003 | DE-604 | ||
005 | 20200124 | ||
007 | t| | ||
008 | 071118s2007 xx |||| 00||| eng d | ||
015 | |a GBA766476 |2 dnb | ||
020 | |a 9780816650439 |9 978-0-8166-5043-9 | ||
020 | |a 9780816650446 |9 978-0-8166-5044-6 | ||
035 | |a (OCoLC)123079452 | ||
035 | |a (DE-599)BVBBV023008162 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-M472 |a DE-B170 |a DE-11 |a DE-188 | ||
050 | 0 | |a HM741 | |
082 | 0 | |a 303.48/3301 |2 22 | |
084 | |a AP 18000 |0 (DE-625)7039: |2 rvk | ||
084 | |a CC 5200 |0 (DE-625)17636: |2 rvk | ||
100 | 1 | |a Galloway, Alexander R. |d 1974- |e Verfasser |0 (DE-588)140598308 |4 aut | |
245 | 1 | 0 | |a The exploit |b a theory of networks |c Alexander R. Galloway and Eugene Thacker |
264 | 1 | |a Minneapolis, Minn. ; London |b Univ. of Minnesota Press |c 2007 | |
300 | |a VII, 196 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Electronic mediations |v 21 | |
500 | |a Literaturverz. S. 167 - 180 | ||
505 | 0 | |a On reading this book -- Proleogmenon: "we're tired of trees" -- Provisional response 1: political atomism (the Nietzschean argument) -- Provisional response 2: unilateralism versus multilateralism (the Foucauldian argument) -- Provisional response 3: ubiquity and universality (the Determinist argument) -- Provisional response 4: occultism and cryptography (the Nominalist argument) -- Nodes -- Technology (or theory) -- Theory (or technology) -- Protocol in computer networks -- Protocol in biological networks -- An encoded life -- Toward a political ontology of networks -- The defacement of enmity -- Biopolitics and protocol -- Life-resistance -- The exploit -- Counterprotocol -- Edges -- The datum of cura I -- The datum of cura II -- Sovereignty and biology I -- Sovereignty and biology II -- Abandoning the body politic -- The ghost in the network -- Birth of the algorithm -- Political animals -- Sovereignty and the state of emergency -- Fork bomb I -- Epidemic and endemic -- Network being -- Good viruses (simSARS I) -- Medical surveillance (simSARS II) -- Feedback versus interaction I -- Feedback versus interaction II -- Rhetorics of freedom -- A Google search for my body -- Divine metabolism -- Fork bomb II -- The paranormal and the pathological I -- The paranormal and the pathological II -- Universals of identification -- RFC001b: BMTP -- Fork bomb III -- Unknown unknowns -- Codification, not reification -- Tactics of nonexistence -- Disappearance; or, I've seen it all before -- Stop motion -- Pure metal -- The hypertrophy of matter (four definitions and one axiom) -- The user and the programmer -- Fork bomb IV -- Interface -- There is no content -- Trash, junk, spam -- Coda: bits and atoms -- Appendix: Notes for a liberated computer language -- Notes -- Index | |
650 | 4 | |a Social networks | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Computer network protocols | |
650 | 4 | |a Bioinformatics / Philosophy | |
650 | 4 | |a Sovereignty | |
650 | 7 | |a Computernetwerken |2 gtt | |
650 | 7 | |a Controle |2 gtt | |
650 | 7 | |a Politieke aspecten |2 gtt | |
650 | 4 | |a Philosophie | |
650 | 4 | |a Politik | |
650 | 4 | |a Bioinformatics |x Philosophy | |
650 | 4 | |a Computer network protocols | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Social networks | |
650 | 4 | |a Sovereignty | |
650 | 0 | 7 | |a Soziales Netzwerk |0 (DE-588)4055762-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bioinformatik |0 (DE-588)4611085-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4229053-3 |a Künstlerbuch |2 gnd-content | |
689 | 0 | 0 | |a Soziales Netzwerk |0 (DE-588)4055762-5 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Bioinformatik |0 (DE-588)4611085-9 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Thacker, Eugene |e Verfasser |0 (DE-588)122437446 |4 aut | |
830 | 0 | |a Electronic mediations |v 21 |w (DE-604)BV013378180 |9 21 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016212419&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-016212419 |
Datensatz im Suchindex
_version_ | 1817613139898793984 |
---|---|
adam_text |
Contents
On Reading This Book vii
Prolegomenon: "We're Tired of Trees" 1
Provisional Response 1: Political Atomism (the Nietzschean
Argument)—Provisional Response 2: Unilateralism versus
Multilateralism (the Foucauldian Argument)—Provisional
Response 3: Ubiquity and Universality (the Determinist
Argument)—Provisional Response 4: Occultism and
Cryptography (the Nominalist Argument)
Part I. Nodes 23
Technology (or Theory)—Theory (or Technology) — Protocol
in Computer Networks—Protocol in Biological Networks—
An Encoded Life—Toward a Political Ontology of Networks—
The Defacement of Enmity—Biopolitics and Protocol—Life-
Resistance —The Exploit—Counterprotocol
Part II. Edges 103
The Datum of Cura I—The Datum of Cura 11—Sovereignty and
Biology I—Sovereignty and Biology II—Abandoning the Body
Politic—The Ghost in the Network—Birth of the Algorithm—
Political Animals—Sovereignty and the State of Emergency—
Fork Bomb I—Epidemic and Endemic—Network Being—Good
Viruses (SimSARS I)—Medical Surveillance (SimSARS ID-
Feedback versus Interaction I—Feedback versus Interaction II —
Rhetorics of Freedom—A Google Search for My Body—
Divine Metabolism—Fork Bomb II—The Paranormal and the
Pathological I—The Paranormal and the Pathological II —
Universal of Identification—RFCOOlb: BmTP—Fork Bomb Ill-
Unknown Unknowns—Codification, Not Reification—
Tactics of Nonexistence—Disappearance; or, I've Seen It
All Before—Stop Motion—Pure Metal—The Hypertrophy of
Matter (Four Definitions and One Axiom)—The User and the
Programmer—Fork Bomb IV—Interface—There Is No
Content—Trash, Junk, Spam
Coda: Bits and Atoms 149
Appendix: Notes for a Liberated Computer Language 159
Notes 167
Index 183 |
adam_txt |
Contents
On Reading This Book vii
Prolegomenon: "We're Tired of Trees" 1
Provisional Response 1: Political Atomism (the Nietzschean
Argument)—Provisional Response 2: Unilateralism versus
Multilateralism (the Foucauldian Argument)—Provisional
Response 3: Ubiquity and Universality (the Determinist
Argument)—Provisional Response 4: Occultism and
Cryptography (the Nominalist Argument)
Part I. Nodes 23
Technology (or Theory)—Theory (or Technology) — Protocol
in Computer Networks—Protocol in Biological Networks—
An Encoded Life—Toward a Political Ontology of Networks—
The Defacement of Enmity—Biopolitics and Protocol—Life-
Resistance —The Exploit—Counterprotocol
Part II. Edges 103
The Datum of Cura I—The Datum of Cura 11—Sovereignty and
Biology I—Sovereignty and Biology II—Abandoning the Body
Politic—The Ghost in the Network—Birth of the Algorithm—
Political Animals—Sovereignty and the State of Emergency—
Fork Bomb I—Epidemic and Endemic—Network Being—Good
Viruses (SimSARS I)—Medical Surveillance (SimSARS ID-
Feedback versus Interaction I—Feedback versus Interaction II —
Rhetorics of Freedom—A Google Search for My Body—
Divine Metabolism—Fork Bomb II—The Paranormal and the
Pathological I—The Paranormal and the Pathological II —
Universal of Identification—RFCOOlb: BmTP—Fork Bomb Ill-
Unknown Unknowns—Codification, Not Reification—
Tactics of Nonexistence—Disappearance; or, I've Seen It
All Before—Stop Motion—Pure Metal—The Hypertrophy of
Matter (Four Definitions and One Axiom)—The User and the
Programmer—Fork Bomb IV—Interface—There Is No
Content—Trash, Junk, Spam
Coda: Bits and Atoms 149
Appendix: Notes for a Liberated Computer Language 159
Notes 167
Index 183 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Galloway, Alexander R. 1974- Thacker, Eugene |
author_GND | (DE-588)140598308 (DE-588)122437446 |
author_facet | Galloway, Alexander R. 1974- Thacker, Eugene |
author_role | aut aut |
author_sort | Galloway, Alexander R. 1974- |
author_variant | a r g ar arg e t et |
building | Verbundindex |
bvnumber | BV023008162 |
callnumber-first | H - Social Science |
callnumber-label | HM741 |
callnumber-raw | HM741 |
callnumber-search | HM741 |
callnumber-sort | HM 3741 |
callnumber-subject | HM - Sociology |
classification_rvk | AP 18000 CC 5200 |
contents | On reading this book -- Proleogmenon: "we're tired of trees" -- Provisional response 1: political atomism (the Nietzschean argument) -- Provisional response 2: unilateralism versus multilateralism (the Foucauldian argument) -- Provisional response 3: ubiquity and universality (the Determinist argument) -- Provisional response 4: occultism and cryptography (the Nominalist argument) -- Nodes -- Technology (or theory) -- Theory (or technology) -- Protocol in computer networks -- Protocol in biological networks -- An encoded life -- Toward a political ontology of networks -- The defacement of enmity -- Biopolitics and protocol -- Life-resistance -- The exploit -- Counterprotocol -- Edges -- The datum of cura I -- The datum of cura II -- Sovereignty and biology I -- Sovereignty and biology II -- Abandoning the body politic -- The ghost in the network -- Birth of the algorithm -- Political animals -- Sovereignty and the state of emergency -- Fork bomb I -- Epidemic and endemic -- Network being -- Good viruses (simSARS I) -- Medical surveillance (simSARS II) -- Feedback versus interaction I -- Feedback versus interaction II -- Rhetorics of freedom -- A Google search for my body -- Divine metabolism -- Fork bomb II -- The paranormal and the pathological I -- The paranormal and the pathological II -- Universals of identification -- RFC001b: BMTP -- Fork bomb III -- Unknown unknowns -- Codification, not reification -- Tactics of nonexistence -- Disappearance; or, I've seen it all before -- Stop motion -- Pure metal -- The hypertrophy of matter (four definitions and one axiom) -- The user and the programmer -- Fork bomb IV -- Interface -- There is no content -- Trash, junk, spam -- Coda: bits and atoms -- Appendix: Notes for a liberated computer language -- Notes -- Index |
ctrlnum | (OCoLC)123079452 (DE-599)BVBBV023008162 |
dewey-full | 303.48/3301 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 303 - Social processes |
dewey-raw | 303.48/3301 |
dewey-search | 303.48/3301 |
dewey-sort | 3303.48 43301 |
dewey-tens | 300 - Social sciences |
discipline | Allgemeines Soziologie Philosophie |
discipline_str_mv | Allgemeines Soziologie Philosophie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV023008162</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200124</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">071118s2007 xx |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA766476</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780816650439</subfield><subfield code="9">978-0-8166-5043-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780816650446</subfield><subfield code="9">978-0-8166-5044-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)123079452</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023008162</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-M472</subfield><subfield code="a">DE-B170</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HM741</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">303.48/3301</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">AP 18000</subfield><subfield code="0">(DE-625)7039:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">CC 5200</subfield><subfield code="0">(DE-625)17636:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Galloway, Alexander R.</subfield><subfield code="d">1974-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)140598308</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The exploit</subfield><subfield code="b">a theory of networks</subfield><subfield code="c">Alexander R. Galloway and Eugene Thacker</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Minneapolis, Minn. ; London</subfield><subfield code="b">Univ. of Minnesota Press</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VII, 196 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Electronic mediations</subfield><subfield code="v">21</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. 167 - 180</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">On reading this book -- Proleogmenon: "we're tired of trees" -- Provisional response 1: political atomism (the Nietzschean argument) -- Provisional response 2: unilateralism versus multilateralism (the Foucauldian argument) -- Provisional response 3: ubiquity and universality (the Determinist argument) -- Provisional response 4: occultism and cryptography (the Nominalist argument) -- Nodes -- Technology (or theory) -- Theory (or technology) -- Protocol in computer networks -- Protocol in biological networks -- An encoded life -- Toward a political ontology of networks -- The defacement of enmity -- Biopolitics and protocol -- Life-resistance -- The exploit -- Counterprotocol -- Edges -- The datum of cura I -- The datum of cura II -- Sovereignty and biology I -- Sovereignty and biology II -- Abandoning the body politic -- The ghost in the network -- Birth of the algorithm -- Political animals -- Sovereignty and the state of emergency -- Fork bomb I -- Epidemic and endemic -- Network being -- Good viruses (simSARS I) -- Medical surveillance (simSARS II) -- Feedback versus interaction I -- Feedback versus interaction II -- Rhetorics of freedom -- A Google search for my body -- Divine metabolism -- Fork bomb II -- The paranormal and the pathological I -- The paranormal and the pathological II -- Universals of identification -- RFC001b: BMTP -- Fork bomb III -- Unknown unknowns -- Codification, not reification -- Tactics of nonexistence -- Disappearance; or, I've seen it all before -- Stop motion -- Pure metal -- The hypertrophy of matter (four definitions and one axiom) -- The user and the programmer -- Fork bomb IV -- Interface -- There is no content -- Trash, junk, spam -- Coda: bits and atoms -- Appendix: Notes for a liberated computer language -- Notes -- Index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network protocols</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bioinformatics / Philosophy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sovereignty</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computernetwerken</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Controle</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Politieke aspecten</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Philosophie</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bioinformatics</subfield><subfield code="x">Philosophy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network protocols</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sovereignty</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soziales Netzwerk</subfield><subfield code="0">(DE-588)4055762-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bioinformatik</subfield><subfield code="0">(DE-588)4611085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4229053-3</subfield><subfield code="a">Künstlerbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Soziales Netzwerk</subfield><subfield code="0">(DE-588)4055762-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Bioinformatik</subfield><subfield code="0">(DE-588)4611085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thacker, Eugene</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)122437446</subfield><subfield code="4">aut</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Electronic mediations</subfield><subfield code="v">21</subfield><subfield code="w">(DE-604)BV013378180</subfield><subfield code="9">21</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016212419&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016212419</subfield></datafield></record></collection> |
genre | (DE-588)4229053-3 Künstlerbuch gnd-content |
genre_facet | Künstlerbuch |
id | DE-604.BV023008162 |
illustrated | Not Illustrated |
index_date | 2024-07-02T19:08:13Z |
indexdate | 2024-12-05T15:02:46Z |
institution | BVB |
isbn | 9780816650439 9780816650446 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016212419 |
oclc_num | 123079452 |
open_access_boolean | |
owner | DE-12 DE-M472 DE-B170 DE-11 DE-188 |
owner_facet | DE-12 DE-M472 DE-B170 DE-11 DE-188 |
physical | VII, 196 S. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Univ. of Minnesota Press |
record_format | marc |
series | Electronic mediations |
series2 | Electronic mediations |
spelling | Galloway, Alexander R. 1974- Verfasser (DE-588)140598308 aut The exploit a theory of networks Alexander R. Galloway and Eugene Thacker Minneapolis, Minn. ; London Univ. of Minnesota Press 2007 VII, 196 S. txt rdacontent n rdamedia nc rdacarrier Electronic mediations 21 Literaturverz. S. 167 - 180 On reading this book -- Proleogmenon: "we're tired of trees" -- Provisional response 1: political atomism (the Nietzschean argument) -- Provisional response 2: unilateralism versus multilateralism (the Foucauldian argument) -- Provisional response 3: ubiquity and universality (the Determinist argument) -- Provisional response 4: occultism and cryptography (the Nominalist argument) -- Nodes -- Technology (or theory) -- Theory (or technology) -- Protocol in computer networks -- Protocol in biological networks -- An encoded life -- Toward a political ontology of networks -- The defacement of enmity -- Biopolitics and protocol -- Life-resistance -- The exploit -- Counterprotocol -- Edges -- The datum of cura I -- The datum of cura II -- Sovereignty and biology I -- Sovereignty and biology II -- Abandoning the body politic -- The ghost in the network -- Birth of the algorithm -- Political animals -- Sovereignty and the state of emergency -- Fork bomb I -- Epidemic and endemic -- Network being -- Good viruses (simSARS I) -- Medical surveillance (simSARS II) -- Feedback versus interaction I -- Feedback versus interaction II -- Rhetorics of freedom -- A Google search for my body -- Divine metabolism -- Fork bomb II -- The paranormal and the pathological I -- The paranormal and the pathological II -- Universals of identification -- RFC001b: BMTP -- Fork bomb III -- Unknown unknowns -- Codification, not reification -- Tactics of nonexistence -- Disappearance; or, I've seen it all before -- Stop motion -- Pure metal -- The hypertrophy of matter (four definitions and one axiom) -- The user and the programmer -- Fork bomb IV -- Interface -- There is no content -- Trash, junk, spam -- Coda: bits and atoms -- Appendix: Notes for a liberated computer language -- Notes -- Index Social networks Computer networks Computer network protocols Bioinformatics / Philosophy Sovereignty Computernetwerken gtt Controle gtt Politieke aspecten gtt Philosophie Politik Bioinformatics Philosophy Soziales Netzwerk (DE-588)4055762-5 gnd rswk-swf Bioinformatik (DE-588)4611085-9 gnd rswk-swf (DE-588)4229053-3 Künstlerbuch gnd-content Soziales Netzwerk (DE-588)4055762-5 s DE-604 Bioinformatik (DE-588)4611085-9 s Thacker, Eugene Verfasser (DE-588)122437446 aut Electronic mediations 21 (DE-604)BV013378180 21 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016212419&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Galloway, Alexander R. 1974- Thacker, Eugene The exploit a theory of networks Electronic mediations On reading this book -- Proleogmenon: "we're tired of trees" -- Provisional response 1: political atomism (the Nietzschean argument) -- Provisional response 2: unilateralism versus multilateralism (the Foucauldian argument) -- Provisional response 3: ubiquity and universality (the Determinist argument) -- Provisional response 4: occultism and cryptography (the Nominalist argument) -- Nodes -- Technology (or theory) -- Theory (or technology) -- Protocol in computer networks -- Protocol in biological networks -- An encoded life -- Toward a political ontology of networks -- The defacement of enmity -- Biopolitics and protocol -- Life-resistance -- The exploit -- Counterprotocol -- Edges -- The datum of cura I -- The datum of cura II -- Sovereignty and biology I -- Sovereignty and biology II -- Abandoning the body politic -- The ghost in the network -- Birth of the algorithm -- Political animals -- Sovereignty and the state of emergency -- Fork bomb I -- Epidemic and endemic -- Network being -- Good viruses (simSARS I) -- Medical surveillance (simSARS II) -- Feedback versus interaction I -- Feedback versus interaction II -- Rhetorics of freedom -- A Google search for my body -- Divine metabolism -- Fork bomb II -- The paranormal and the pathological I -- The paranormal and the pathological II -- Universals of identification -- RFC001b: BMTP -- Fork bomb III -- Unknown unknowns -- Codification, not reification -- Tactics of nonexistence -- Disappearance; or, I've seen it all before -- Stop motion -- Pure metal -- The hypertrophy of matter (four definitions and one axiom) -- The user and the programmer -- Fork bomb IV -- Interface -- There is no content -- Trash, junk, spam -- Coda: bits and atoms -- Appendix: Notes for a liberated computer language -- Notes -- Index Social networks Computer networks Computer network protocols Bioinformatics / Philosophy Sovereignty Computernetwerken gtt Controle gtt Politieke aspecten gtt Philosophie Politik Bioinformatics Philosophy Soziales Netzwerk (DE-588)4055762-5 gnd Bioinformatik (DE-588)4611085-9 gnd |
subject_GND | (DE-588)4055762-5 (DE-588)4611085-9 (DE-588)4229053-3 |
title | The exploit a theory of networks |
title_auth | The exploit a theory of networks |
title_exact_search | The exploit a theory of networks |
title_exact_search_txtP | The exploit a theory of networks |
title_full | The exploit a theory of networks Alexander R. Galloway and Eugene Thacker |
title_fullStr | The exploit a theory of networks Alexander R. Galloway and Eugene Thacker |
title_full_unstemmed | The exploit a theory of networks Alexander R. Galloway and Eugene Thacker |
title_short | The exploit |
title_sort | the exploit a theory of networks |
title_sub | a theory of networks |
topic | Social networks Computer networks Computer network protocols Bioinformatics / Philosophy Sovereignty Computernetwerken gtt Controle gtt Politieke aspecten gtt Philosophie Politik Bioinformatics Philosophy Soziales Netzwerk (DE-588)4055762-5 gnd Bioinformatik (DE-588)4611085-9 gnd |
topic_facet | Social networks Computer networks Computer network protocols Bioinformatics / Philosophy Sovereignty Computernetwerken Controle Politieke aspecten Philosophie Politik Bioinformatics Philosophy Soziales Netzwerk Bioinformatik Künstlerbuch |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016212419&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV013378180 |
work_keys_str_mv | AT gallowayalexanderr theexploitatheoryofnetworks AT thackereugene theexploitatheoryofnetworks |