bszlogo
Deutsch Englisch Französisch Spanisch
SWB
sortiert nach
nur Zeitschriften/Serien/Datenbanken nur Online-Ressourcen OpenAccess
  Unscharfe Suche
Suchgeschichte Kurzliste Vollanzeige Besitznachweis(e)

Recherche beenden

  

Ergebnisanalyse

  

Speichern/
Druckansicht

  

Druckvorschau

  
1 von 1
      
1 von 1
      
* Ihre Aktion:   suchen [und] (PICA Prod.-Nr. [PPN]) 1658326830
 Felder   ISBD   MARC21 (FL_924)   Citavi, Referencemanager (RIS)   Endnote Tagged Format   BibTex-Format   RDF-Format 
Online Ressourcen (ohne online verfügbare<BR> Zeitschriften und Aufsätze)
 
K10plusPPN: 
1658326830     Zitierlink
SWB-ID: 
515466697                        
Titel: 
Exploit : A Theory of Networks
Autorin/Autor: 
Galloway, Alexander R., 1974- [Verfasserin/Verfasser] info info
Beteiligt: 
Thacker, Eugene [Mitwirkende/Mitwirkender] info info
Erschienen: 
Minneapolis : University of Minnesota Press, 2007 [©2007.]
Umfang: 
1 online resource (206 pages)
Sprache(n): 
Englisch
Anmerkung: 
Description based on publisher supplied metadata and other sources.
Bibliogr. Zusammenhang: 
Erscheint auch als: (Druck-Ausgabe)
ISBN: 
978-0-8166-5397-3
978-0-8166-5043-9 (ISBN der Printausgabe)


Link zum Volltext: 


Sachgebiete: 
Sonstige Schlagwörter: 
Inhaltliche
Zusammenfassung: 
Alexander R. Galloway and Eugene Thacker challenge the widespread assumption that networks are inherently egalitarian. Instead, they contend that there exist new modes of control entirely native to networks, modes that are at once highly centralized and dispersed, corporate and subversive. In this provocative book, they argue that a whole new topology must be invented to resist and reshape the network form.

Intro -- Contents -- On Reading This Book -- Prolegomenon: "We're Tired of Trees" -- Provisional Response 1: Political Atomism (the Nietzschean Argument) -- Provisional Response 2: Unilateralism versus Multilateralism (the Foucauldian Argument) -- Provisional Response 3: Ubiquity and Universality (the Determinist Argument) -- Provisional Response 4: Occultism and Cryptography (the Nominalist Argument) -- Part I. Nodes -- Technology (or Theory) -- Theory (or Technology) -- Protocol in Computer Networks -- Protocol in Biological Networks -- An Encoded Life -- Toward a Political Ontology of Networks -- The Defacement of Enmity -- Biopolitics and Protocol -- Life-Resistance -- The Exploit -- Counterprotocol -- Part II. Edges -- The Datum of Cura I -- The Datum of Cura II -- Sovereignty and Biology I -- Sovereignty and Biology II -- Abandoning the Body Politic -- The Ghost in the Network -- Birth of the Algorithm -- Political Animals -- Sovereignty and the State of Emergency -- Fork Bomb I -- Epidemic and Endemic -- Network Being -- Good Viruses (SimSARS I) -- Medical Surveillance (SimSARS II) -- Feedback versus Interaction I -- Feedback versus Interaction II -- Rhetorics of Freedom -- A Google Search for My Body -- Divine Metabolism -- Fork Bomb II -- The Paranormal and the Pathological I -- The Paranormal and the Pathological II -- Universals of Identification -- RFC001b: BmTP -- Fork Bomb III -- Unknown Unknowns -- Codification, Not Reification -- Tactics of Nonexistence -- Disappearance -- or, I've Seen It All Before -- Stop Motion -- Pure Metal -- The Hypertrophy of Matter (Four Definitions and One Axiom) -- The User and the Programmer -- Fork Bomb IV -- Interface -- There Is No Content -- Trash, Junk, Spam -- Coda: Bits and Atoms -- Appendix: Notes for a Liberated Computer Language -- Notes -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I.
 Zum Volltext 

1 von 1
      
1 von 1