Community Reading List: Difference between revisions

formatted and added categories
Cybersecurity: Removed document link
Tags: Mobile edit Mobile web edit
 
(6 intermediate revisions by the same user not shown)
Line 1: Line 1:
== RSS ==
== Community Recommended Reading and Listening List ==


== 2025 ==
== 2023 ==
=== Leadership ===
=== Leadership ===
For the full DFP Guides, see [[dfp-guide|DFP Guide]].
For the full DFP Guides, see [[dfp-guide|DFP Guide]].
Line 32: Line 34:
==== Applied Predictive Modeling ====
==== Applied Predictive Modeling ====
* '''[https://www.amazon.com/Applied-Predictive-Modeling-Max-Kuhn/dp/1461468485 Applied Predictive Modeling] by Max Kuhn and Kjell Johnson'''  
* '''[https://www.amazon.com/Applied-Predictive-Modeling-Max-Kuhn/dp/1461468485 Applied Predictive Modeling] by Max Kuhn and Kjell Johnson'''  
* [https://vuquangnguyen2016.files.wordpress.com/2018/03/applied-predictive-modeling-max-kuhn-kjell-johnson_1518.pdf pdf link]  
** [https://vuquangnguyen2016.files.wordpress.com/2018/03/applied-predictive-modeling-max-kuhn-kjell-johnson_1518.pdf pdf link]


=== Psychology ===
=== Psychology ===
Line 87: Line 89:
==== Cybersecurity ====
==== Cybersecurity ====
* '''[https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787/ The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage] by Cliff Stoll'''
* '''[https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787/ The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage] by Cliff Stoll'''
* '''[https://pure.tue.nl/ws/portalfiles/portal/197416841/20220325''Appelbaum''hf.pdf Communication in a world of pervasive surveillance: Counter-strategies against pervasive surveillance architecture]'''
 
* '''[https://www.amazon.com/dp/1681774593/ Cyber Spies] by Gordon Corera'''
* '''[https://www.amazon.com/dp/1681774593/ Cyber Spies] by Gordon Corera'''
* '''[https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0385544405/ Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers] by Andy Greenberg'''
* '''[https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0385544405/ Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers] by Andy Greenberg'''


== NFTs ==
==== Blockchain ====
* '''On Constellation:'''
* '''On Constellation:'''
  * [https://medium.com/@lee.papa/the-unique-value-proposition-and-bull-case-for-constellation-network-1c260dc03f23 The Unique Value Proposition and Bull Case for Constellation Network]
** [https://medium.com/@lee.papa/the-unique-value-proposition-and-bull-case-for-constellation-network-1c260dc03f23 The Unique Value Proposition and Bull Case for Constellation Network]
  * [https://medium.com/@lee.papa/a-brief-history-of-the-hypergraph-1d8f79fd72e5 A Brief History of the Hypergraph]
** [https://medium.com/@lee.papa/a-brief-history-of-the-hypergraph-1d8f79fd72e5 A Brief History of the Hypergraph]
* '''On Void:'''
* '''On Void:'''
  * [https://enterthevoidnft.medium.com/ Enter the Void NFT]
** [https://enterthevoidnft.medium.com/ Enter the Void NFT]


=== Philosophy ===
=== Philosophy ===