Community Reading List: Difference between revisions
formatted and added categories |
→Cybersecurity: Removed document link Tags: Mobile edit Mobile web edit |
||
(6 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
== | == Community Recommended Reading and Listening List == | ||
== 2025 == | |||
== 2023 == | |||
=== Leadership === | === Leadership === | ||
For the full DFP Guides, see [[dfp-guide|DFP Guide]]. | For the full DFP Guides, see [[dfp-guide|DFP Guide]]. | ||
Line 32: | Line 34: | ||
==== Applied Predictive Modeling ==== | ==== Applied Predictive Modeling ==== | ||
* '''[https://www.amazon.com/Applied-Predictive-Modeling-Max-Kuhn/dp/1461468485 Applied Predictive Modeling] by Max Kuhn and Kjell Johnson''' | * '''[https://www.amazon.com/Applied-Predictive-Modeling-Max-Kuhn/dp/1461468485 Applied Predictive Modeling] by Max Kuhn and Kjell Johnson''' | ||
* [https://vuquangnguyen2016.files.wordpress.com/2018/03/applied-predictive-modeling-max-kuhn-kjell-johnson_1518.pdf pdf link] | ** [https://vuquangnguyen2016.files.wordpress.com/2018/03/applied-predictive-modeling-max-kuhn-kjell-johnson_1518.pdf pdf link] | ||
=== Psychology === | === Psychology === | ||
Line 87: | Line 89: | ||
==== Cybersecurity ==== | ==== Cybersecurity ==== | ||
* '''[https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787/ The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage] by Cliff Stoll''' | * '''[https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787/ The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage] by Cliff Stoll''' | ||
* '''[https://www.amazon.com/dp/1681774593/ Cyber Spies] by Gordon Corera''' | * '''[https://www.amazon.com/dp/1681774593/ Cyber Spies] by Gordon Corera''' | ||
* '''[https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0385544405/ Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers] by Andy Greenberg''' | * '''[https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0385544405/ Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers] by Andy Greenberg''' | ||
== | ==== Blockchain ==== | ||
* '''On Constellation:''' | * '''On Constellation:''' | ||
** [https://medium.com/@lee.papa/the-unique-value-proposition-and-bull-case-for-constellation-network-1c260dc03f23 The Unique Value Proposition and Bull Case for Constellation Network] | |||
** [https://medium.com/@lee.papa/a-brief-history-of-the-hypergraph-1d8f79fd72e5 A Brief History of the Hypergraph] | |||
* '''On Void:''' | * '''On Void:''' | ||
** [https://enterthevoidnft.medium.com/ Enter the Void NFT] | |||
=== Philosophy === | === Philosophy === |