Deconstruction machines: writing in the age of cyberwar

Minneapolis: University of Minnesota Press (2018)
  Copy   BIBTEX

Abstract

Root kit -- Buffer overflow: the space and time of cyberwar -- Injection attack: writing and the information catastrophe -- Distributed denial of service: cybernetic sovereignty -- Spear phishing: nodal subjects -- Firmware vulnerabilities.

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 101,880

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

St!le in deconstruction.Laurent Milesi - 2013 - In Milesi Laurent (ed.). pp. 217-48.
Investigation of vulnerabilities in implementation of crypto library used by OpenVPN for IPV6 deployment.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies, 1 (4):1-13.
Splitting the origin : writing and responsibility.Margret Grebowicz - 2009 - In Martin McQuillan & Ika Willis (eds.), The origins of deconstruction. New York: Palgrave-Macmillan.
Writing (on deconstruction) at the edge of metaphysics'.Hugh J. Silverman - 1983 - Research in Phenomenology 13 (1):97-111.
Foreword.Clayton Crockett - 2009 - In Catherine Malabou (ed.), Plasticity at the Dusk of Writing: Dialectic, Destruction, Deconstruction. Columbia University Press.
Digital Forensics.Stefan Meier - 2018 - In Wolff Heintschel von Heinegg, Robert Frau & Tassilo Singer (eds.), Dehumanization of Warfare: Legal Implications of New Weapon Technologies. Springer Verlag. pp. 129-145.

Analytics

Added to PP
2022-12-06

Downloads
7 (#1,647,891)

6 months
2 (#1,700,055)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

Add more citations

References found in this work

No references found.

Add more references