Description

Book Synopsis

A bold new theory of cyberwar argues that militarized hacking is best understood as a form of deconstruction

From shadowy attempts to steal state secrets to the explosive destruction of Iranian centrifuges, cyberwar has been a vital part of statecraft for nearly thirty years. But although computer-based warfare has been with us for decades, it has changed dramatically since its emergence in the 1990s, and the pace of change is accelerating.

In Deconstruction Machines, Justin Joque inquires into the fundamental nature of cyberwar through a detailed investigation of what happens at the crisis points when cybersecurity systems break down and reveal their internal contradictions. He concludes that cyberwar is best envisioned as a series of networks whose constantly shifting connections shape its very possibilities. He ultimately envisions cyberwar as a form of writing, advancing the innovative thesis that cyber attacks should be seen as a militarized form of deconstruction in which computer programs are systems that operate within the broader world of texts.

Throughout, Joque addresses hot-button subjects such as technological social control and cyber-resistance entities like Anonymous and Wikileaks while also providing a rich, detailed history of cyberwar. Deconstruction Machines provides a necessary new interpretation of deconstruction and timely analysis of media, war, and technology.



Trade Review

"Deconstruction machines provides a powerful insight into how cyberwar serves to militarize writing, threatens civic infrastructure and thereby brings war into the code and software that governs our everyday lives." —International Affairs



Table of Contents

Contents
Foreword
Catherine Malabou
Acknowledgments
Introduction: Root Kit
1. Buffer Overflow: The Space and Time of Cyberwar
2. Injection Attack: Writing and the Information Catastrophe
3. Distributed Denial of Service: Cybernetic Sovereignty
4. Spear Phishing: Nodal Subjects
Conclusion: Firmware Vulnerabilities
Notes
Index

Deconstruction Machines: Writing in the Age of

Product form

£77.60

Includes FREE delivery

RRP £97.00 – you save £19.40 (20%)

Order before 4pm today for delivery by Wed 14 Jan 2026.

A Hardback by Justin Joque, Catherine Malabou

Out of stock


    View other formats and editions of Deconstruction Machines: Writing in the Age of by Justin Joque

    Publisher: University of Minnesota Press
    Publication Date: 27/02/2018
    ISBN13: 9781517902513, 978-1517902513
    ISBN10: 1517902517

    Description

    Book Synopsis

    A bold new theory of cyberwar argues that militarized hacking is best understood as a form of deconstruction

    From shadowy attempts to steal state secrets to the explosive destruction of Iranian centrifuges, cyberwar has been a vital part of statecraft for nearly thirty years. But although computer-based warfare has been with us for decades, it has changed dramatically since its emergence in the 1990s, and the pace of change is accelerating.

    In Deconstruction Machines, Justin Joque inquires into the fundamental nature of cyberwar through a detailed investigation of what happens at the crisis points when cybersecurity systems break down and reveal their internal contradictions. He concludes that cyberwar is best envisioned as a series of networks whose constantly shifting connections shape its very possibilities. He ultimately envisions cyberwar as a form of writing, advancing the innovative thesis that cyber attacks should be seen as a militarized form of deconstruction in which computer programs are systems that operate within the broader world of texts.

    Throughout, Joque addresses hot-button subjects such as technological social control and cyber-resistance entities like Anonymous and Wikileaks while also providing a rich, detailed history of cyberwar. Deconstruction Machines provides a necessary new interpretation of deconstruction and timely analysis of media, war, and technology.



    Trade Review

    "Deconstruction machines provides a powerful insight into how cyberwar serves to militarize writing, threatens civic infrastructure and thereby brings war into the code and software that governs our everyday lives." —International Affairs



    Table of Contents

    Contents
    Foreword
    Catherine Malabou
    Acknowledgments
    Introduction: Root Kit
    1. Buffer Overflow: The Space and Time of Cyberwar
    2. Injection Attack: Writing and the Information Catastrophe
    3. Distributed Denial of Service: Cybernetic Sovereignty
    4. Spear Phishing: Nodal Subjects
    Conclusion: Firmware Vulnerabilities
    Notes
    Index

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account