Table of contents for The exploit : a theory of networks / Alexander R. Galloway and Eugene Thacker.

Bibliographic record and links to related information available from the Library of Congress catalog.

Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding.


Counter
Contents
On Reading This Book
Proleogmenon: "We're Tired of Trees"
A Global Dynamic -Political Atomism-Unilateralism versus Multilateralism-Ubiquity and Universality-Occultism and Cryptography-Networks Fighting Networks-The New Sovereignty
Part I. Nodes
Technology (or Theory)
Theory (or Technology)
Protocol in Computer Networks
Protocol in Biological Networks
An Encoded Life
Toward a Political Ontology of Networks
The Defacement of Enmity
Biopolitics and Protocol
Life-Resistance
The Exploit
Counterprotocol
Part II. Edges
The Datum of Cura I 
The Datum of Cura II
Sovereignty and Biology I
Sovereignty and Biology II
Abandoning the Body Politic
The Ghost in the Network
Birth of the Algorithm
Political Animals
Sovereignty and the State of Emergency
Fork Bomb I
Epidemic and Endemic
Network Being
Good Viruses (SimSARS I)
Medical Surveillance (SimSARS II)
Feedback versus Interaction I
Feedback versus Interaction II
Rhetorics of Freedom
A Google Search for My Body
Divine Metabolism
Fork Bomb II
The Paranormal and the Pathological I
The Paranormal and the Pathological II
Universals of Identification
RFC001b: BmTP
Fork Bomb III
Unknown Unknowns
Codification, Not Reification
Tactics of Nonexistence
Disappearance; or, I've Seen It All Before
Stop Motion
Pure Metal
The Hypertrophy of Matter
The User and the Programmer
Fork Bomb IV
Interface
There Is No Content
Trash, Junk, Spam
Coda: Bits and Atoms
Appendix: Notes for a Liberated Computer Language
Notes
Index

Library of Congress Subject Headings for this publication:

Social networks.
Computer networks.
Computer network protocols.
Bioinformatics -- Philosophy.
Sovereignty.