14.04.2015 Views

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

On Reading This Book<br />

It is our intention in this book to avoid the limits <strong>of</strong> academic writing<br />

in favor <strong>of</strong> a more experimental, speculative approach. To that<br />

end, we adopt a two - tier format. Throughout Part I, “Nodes,” you will<br />

find a number <strong>of</strong> condensed, italicized headers that are glued together<br />

with more standard prose. For quick immersion, we suggest skimming<br />

Part I by reading the italicized sections only. Alternatively, you may<br />

inspect the diversions and intensifications that form the main body<br />

<strong>of</strong> the text. Part II, “Edges,” continues the experiment with a number<br />

<strong>of</strong> miniature essays, modules, and fragments. In this sense, we hope<br />

you will experience the book not as the step - by - step propositional<br />

evolution <strong>of</strong> a complete theory but as a series <strong>of</strong> marginal claims, disconnected<br />

in a living environment <strong>of</strong> many thoughts, distributed<br />

across as many pages.<br />

vii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!