Don't judge a book by its cover or even a cursory reading of its title. This book is only tangentially about computer hacking and hackers. Instead of examining the practices of hacking, this book itself functions as hacking. That is, it is a clever and resourceful investigation of computer techno
Hacking Cyberspace
β Scribed by David J. Gunkel
- Year
- 2001
- Tongue
- English
- Leaves
- 250
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
In Hacking Cyberspace David J. Gunkel examines the metaphors applied to new technologies, and how those metaphors inform, shape, and drive the implementation of the technology in question. The author explores the metaphorical tropes that have been employed to describe and evaluate recent advances in computer technology, telecommunications systems, and interactive media. Taking the stance that no speech is value-neutral, Gunkel examines such metaphors as "the information superhighway" and "the electronic frontier" for their political and social content, and he develops a critical investigation that not only traces the metaphors' conceptual history, but explicates their implications and consequences for technological development. Through Hacking Cyberspace, David J. Gunkel develops a sophisticated understanding of new technology that takes into account the effect of technoculture's own discursive techniques and maneuvers on the actual form of technological development.
π SIMILAR VOLUMES
<p>This book explores the concept of cyberplace as a mode of inhabiting the contemporary world. As a result, it suggests that, for many communities, unlocking cyberspace and inhabiting cyberplaces is now an integral part of their coming-to-the-globalised-world. <br>Boos reviews in the detail the exi
The spectacular cyber attack on Sony Pictures and costly hacks of Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to addre
The spectacular cyber attack on Sony Pictures and costly hacks of Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to addre
The spectacular cyber attack on Sony Pictures and costly hacks to Sony, Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology co