In this Book

University of Virginia Press
summary
Is literature dangerous? In the romantic view, writers were rebels--Shelley's "unacknowledged legislators of mankind"--poised to change the world. In relation to twentieth-century literature, however, such a view becomes suspect. By looking at a range of novels about terrorism, Plotting Terror raises the possibility that the writer's relationship to actual politics may be considerably reduced in the age of television and the Internet.

Table of Contents

  1. Cover
  2. restricted access Download |
  1. Title Page
  2. restricted access Download |
  1. Copyright Page
  2. restricted access Download |
  1. Table of Contents
  2. pp. vii-viii
  3. restricted access Download |
  1. Acknowledgements
  2. pp. ix-xiv
  3. restricted access Download |
  1. Introduction
  2. pp. 1-16
  3. restricted access Download |
  1. Part I: The Terrorist Rival
  2. pp. 17-18
  1. Chapter 1: Don DeLillo’s Mao II and the Rushdie Affair
  2. pp. 19-36
  3. restricted access Download |
  1. Chapter 2: Eoin McNamee’s Resurrection Man
  2. pp. 37-56
  3. restricted access Download |
  1. Part II: Displaced Causes
  2. pp. 57-58
  1. Chapter 3: Mary McCarthy’s Cannibals and Missionaries
  2. pp. 59-74
  3. restricted access Download |
  1. Chapter 4: Doris Lessing’s The Good Terrorist
  2. pp. 75-92
  3. restricted access Download |
  1. Part III: Novelist as Terrorist: Terrorism as Fiction
  2. pp. 93-94
  1. Chapter 5: J. M. Coetzee’s The Master of Petersburg
  2. pp. 95-107
  3. restricted access Download |
  1. Chapter 6: Friedrich Dürrenmatt’s The Assignment
  2. pp. 108-120
  3. restricted access Download |
  1. Part IV: Is Terrorism Dead?
  2. pp. 121-122
  1. Chapter 7: Philip Roth’s and Robert Stone’s Jerusalem Novels
  2. pp. 123-138
  3. restricted access Download |
  1. Chapter 8: Volodine’s Lisbonne Dernière Marge
  2. pp. 139-154
  3. restricted access Download |
  1. Epilogue: Conrad and the Unabomber
  2. pp. 155-162
  3. restricted access Download |
  1. Notes
  2. pp. 163-182
  3. restricted access Download |
  1. Bibliography
  2. pp. 183-194
  3. restricted access Download |
  1. Index
  2. pp. 195-199
  3. restricted access Download |
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.