The Exploit is that rare thing: a book with a clear grasp of how networks operate that also understands the political implications of this emerging form of power. It cuts through the nonsense about how 'free' and 'democratic' networks supposedly are, and it offers a rich analysis of how network protocols create a new kind of control. Essential reading for all theorists, artists, activists, techheads, and hackers of the Net. McKenzie Wark, author of A Hacker Manifesto The network has become the core organizational structure for postmodern politics, culture, and life, replacing the modern eras hierarchical systems. From peer-to-peer file sharing and massive multiplayer online games to contagion vectors of digital or biological viruses and global affiliations of terrorist organizations, the network form has become so invasive that nearly every aspect of contemporary society can be located within it. Borrowing their title from the hacker term for a program that takes advantage of a flaw in a network system, Alexander R. Galloway and Eugene Thacker challenge the widespread assumption that networks are inherently egalitarian. Instead, they contend that there exist new modes of control entirely native to networks, modes that are at once highly centralized and dispersed, corporate and subversive. In this provocative book-length essay, Galloway and Thacker argue that a whole new topology must be invented to resist and reshape the network form, one that is as asymmetrical in relationship to networks as the network is in relation to hierarchy. Alexander R. Galloway is associate professor of culture and communications at New York University and the author of Gaming: Essays on Algorithmic Culture (Minnesota, 2006) and Protocol: How Control Exists after Decentralization. Eugene Thacker is associate professor of new media at the Georgia Institute of Technology and the author of Biomedia (Minnesota, 2004) and The Global Genome: Biotechnology, Politics, and Culture.
[1]
A. D. Ritchie.
The Creative Mind
,
1946,
Nature.
[2]
H. E. Wimperis.
Military and Political Consequences of Atomic Energy
,
1949
.
[3]
G. Ledyard Stebbins,et al.
The Major Features of Evolution
. George Gaylord Simpson. Columbia Univ. Press, New York, 1953. 434 pp. Illus. $7.50
,
1954,
Science.
[4]
Dimitris N. Chorafas.
Statistical processes and reliability engineering
,
1962
.
[5]
David L. T. Anderson,et al.
Science Since Babylon
,
1961
.
[6]
E. Robinson.
Cybernetics, or Control and Communication in the Animal and the Machine
,
1963
.
[7]
Race And History
,
1966
.
[8]
Viktor Mikhaĭlovich Glushkov,et al.
An Introduction to Cybernetics
,
1957,
The Mathematical Gazette.
[9]
H. Kröger,et al.
[Protein synthesis].
,
1974,
Fortschritte der Medizin.
[10]
Fred Cohen,et al.
Computer viruses—theory and experiments
,
1990
.
[11]
Alan Dove,et al.
From bits to bases: Computing with DNA
,
1998,
Nature Biotechnology.
[12]
Gregor D. Scott.
Guide for Internet Standards Writers
,
1998,
RFC.
[13]
Lily E. Kay,et al.
Who Wrote the Book of Life?: A History of the Genetic Code
,
2000
.
[14]
Michael D. Dahnke.
Ethics as First Philosophy
,
2001
.
[15]
Michael Hardt,et al.
Multitude: War and Democracy in the Age of Empire
,
2004
.