Industrial-Sized Deals TextBTS15 Shop Men's Hightops Learn more nav_sap_SWP_6M_fly_beacon David Ramirez $5 Off Fire TV Stick Grocery Shop Popular Services hog hog hog  Amazon Echo Starting at $99 Kindle Voyage Nintendo Digital Games Gear Up for Football Deal of the Day
The Exploit: A Theory of Networks (Electronic Mediations) and over one million other books are available for Amazon Kindle. Learn more

The Exploit: A Theory of Networks (Electronic Mediations)

4 customer reviews
ISBN-13: 978-0816650446
ISBN-10: 0816650446
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used
$8.83
Buy new
$13.80
More Buying Choices
33 New from $11.00 21 Used from $8.38
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


InterDesign Brand Store Awareness Rent Textbooks
$13.80 FREE Shipping on orders over $35. Only 10 left in stock (more on the way). Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

The Exploit: A Theory of Networks (Electronic Mediations) + Protocol: How Control Exists after Decentralization (Leonardo Book Series) + The Interface Effect
Price for all three: $48.84

Buy the selected items together

If you buy a new print edition of this book (or purchased one in the past), you can buy the Kindle edition for only $2.99 (Save 70%). Print edition purchase must be sold by Amazon. Learn more.



China
Engineering & Transportation Books
Discover books for all types of engineers, auto enthusiasts, and much more. Learn more

Product Details

  • Series: Electronic Mediations (Book 21)
  • Paperback: 256 pages
  • Publisher: Univ Of Minnesota Press (October 1, 2007)
  • Language: English
  • ISBN-10: 0816650446
  • ISBN-13: 978-0816650446
  • Product Dimensions: 5.4 x 0.6 x 8.5 inches
  • Shipping Weight: 2 pounds (View shipping rates and policies)
  • Average Customer Review: 2.8 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Best Sellers Rank: #129,403 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews

23 of 24 people found the following review helpful By Henry Berry on December 16, 2007
Format: Paperback
Authors Galloway and Thacker--with New York University and the Georgia Institute of Technology respectively--pose a dichotomy between networks and sovereignty. Sovereignty is the longtime, historical form of government and society; often described as "hierarchic." Networks, on the other hand as any contemporary person knows, are newer, postmodern, forms of social organization--or topology--and activity. The difference between sovereignty and network is the difference between architecture and biology.

The co-authors take a "more speculative, experimental approach [resulting in] a series of marginal claims" rather than a theory to try to grasp the essential nature and actual effects of networks; all the while recognizing that "the nonhuman quality of networks is precisely what makes them so difficult to grasp". With sovereignty, leaders--i. e., persons--and laws or conventions were recognizable formative elements. With networks on the other hand, there are no permanent nor widely-accepted leaders and no code of law or centuries of convention forming or even governing them. Yet, there are businesses and services such as protocols and institutions such as Microsoft and Google which strongly influence and in some ways determine the presence and activity of networks. The belief that networks, particularly the Internet, are naturally, intentionally, or inevitably egalitarian is misleading.

The author's "speculative" approach carries them to summaries and critiques of philosophers from widely differing ages and with widely differing ideas and even worldviews; among these, Plato and Hobbes, Foucault and Guattari, Baudrillard and Virilio, Michael Hardt and Antonio Negri.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By ryan on September 5, 2014
Format: Paperback Verified Purchase
A refreshingly sober look at the socio-political effects of contemporary network technologies, advancing thought along the trajectory established by Deluze's late work on societies of control.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
0 of 1 people found the following review helpful By Ken on January 20, 2014
Format: Paperback Verified Purchase
Surely the idea is interesting but the content is nonsense, not very well structured (it talks about protocols for 50 pages and then it defines them), talks about a lot of useless things without getting to the point, there is not a single example that touches ground in the whole book.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
15 of 38 people found the following review helpful By Mark J. Tomko on July 26, 2011
Format: Paperback Verified Purchase
The authors clearly had a great idea, but this book ends up containing a lot of nonsense, bluster, and outright garbage. Too bad: I would have loved to read the book that it promised to be. There are real implications of our increasingly networked society; changes to dynamics of power and control. Unfortunately, the authors are too busy tying themselves in knots of their own psychobabble to sort any of it out.

I don't think that the authors really understand the technology whose implications on society they purport to review. Anyone who's taken a course in computer networking will understand that there are no political implications in the maxim "Be liberal in what you accept, and conservative in what you send," enshrined in RFC 1122. That is a guideline for implementing a software system and nothing else. One chapter includes a series of "fork bombs", little Perl scripts intended to crash a computer if they're run. They inserted in the text without comment, as a way to make the authors look smart, but any script kiddie could have looked up these little programs on the Internet. Why present them here? Turn to the end of the book and you'll see the authors' own "programming language" full of idiotic constructs that in the end add nothing to the book. Obviously, it's not intended to be implemented anywhere, but it also doesn't further anyone's point to include some Duchampian computer language. How childish.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Set up an Amazon Giveaway

Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
The Exploit: A Theory of Networks (Electronic Mediations)
This item: The Exploit: A Theory of Networks (Electronic Mediations)
Price: $13.80
Ships from and sold by Amazon.com