Community Reading List: Difference between revisions

From Irregularpedia
Jump to navigation Jump to search
No edit summary
Tag: wikieditor
→‎Cybersecurity: Removed document link
Tags: Mobile edit Mobile web edit
 
(5 intermediate revisions by the same user not shown)
Line 1: Line 1:
= Community Recommended Reading and Listening List =
== Community Recommended Reading and Listening List ==


== 2025 ==  
== 2025 ==  
Line 34: Line 34:
==== Applied Predictive Modeling ====
==== Applied Predictive Modeling ====
* '''[https://www.amazon.com/Applied-Predictive-Modeling-Max-Kuhn/dp/1461468485 Applied Predictive Modeling] by Max Kuhn and Kjell Johnson'''  
* '''[https://www.amazon.com/Applied-Predictive-Modeling-Max-Kuhn/dp/1461468485 Applied Predictive Modeling] by Max Kuhn and Kjell Johnson'''  
* [https://vuquangnguyen2016.files.wordpress.com/2018/03/applied-predictive-modeling-max-kuhn-kjell-johnson_1518.pdf pdf link]  
** [https://vuquangnguyen2016.files.wordpress.com/2018/03/applied-predictive-modeling-max-kuhn-kjell-johnson_1518.pdf pdf link]


=== Psychology ===
=== Psychology ===
Line 89: Line 89:
==== Cybersecurity ====
==== Cybersecurity ====
* '''[https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787/ The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage] by Cliff Stoll'''
* '''[https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787/ The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage] by Cliff Stoll'''
* '''[https://pure.tue.nl/ws/portalfiles/portal/197416841/20220325''Appelbaum''hf.pdf Communication in a world of pervasive surveillance: Counter-strategies against pervasive surveillance architecture]'''
 
* '''[https://www.amazon.com/dp/1681774593/ Cyber Spies] by Gordon Corera'''
* '''[https://www.amazon.com/dp/1681774593/ Cyber Spies] by Gordon Corera'''
* '''[https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0385544405/ Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers] by Andy Greenberg'''
* '''[https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0385544405/ Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers] by Andy Greenberg'''


== NFTs ==
==== Blockchain ====
* '''On Constellation:'''
* '''On Constellation:'''
  * [https://medium.com/@lee.papa/the-unique-value-proposition-and-bull-case-for-constellation-network-1c260dc03f23 The Unique Value Proposition and Bull Case for Constellation Network]
** [https://medium.com/@lee.papa/the-unique-value-proposition-and-bull-case-for-constellation-network-1c260dc03f23 The Unique Value Proposition and Bull Case for Constellation Network]
  * [https://medium.com/@lee.papa/a-brief-history-of-the-hypergraph-1d8f79fd72e5 A Brief History of the Hypergraph]
** [https://medium.com/@lee.papa/a-brief-history-of-the-hypergraph-1d8f79fd72e5 A Brief History of the Hypergraph]
* '''On Void:'''
* '''On Void:'''
  * [https://enterthevoidnft.medium.com/ Enter the Void NFT]
** [https://enterthevoidnft.medium.com/ Enter the Void NFT]


=== Philosophy ===
=== Philosophy ===

Latest revision as of 11:32, 31 October 2024

Community Recommended Reading and Listening List

2025

2023

Leadership

For the full DFP Guides, see DFP Guide.

This section provides a list of recommended readings on leadership:

Influence

Information Operations

Social Engineering

Society

Modeling

Applied Predictive Modeling

Psychology

Open Source Warfare

Crowd Psychology

Foreign Perspectives of America

War

Intelligence, Research, and Analysis

RSS

Intelligence Gathering and Analysis

Research and Analysis

Technology

Cybersecurity

Blockchain

Philosophy