Book Summaries
Creativity
- The War of Art– Steven Pressfield –Summary - Lateral Thinking: Creativity Step by Step – Edward de Bono –Summary - Mastery– Robert Greene –Summary - Quiet: The Power of Introverts in a World That Can’t Stop Talking – Susan Cain –Summary - Peak: Secrets from the New Science of Expertise– Anders Er
- The War of Art– Steven Pressfield –Summary
- Lateral Thinking: Creativity Step by Step – Edward de Bono –Summary
- Mastery– Robert Greene –Summary
- Quiet: The Power of Introverts in a World That Can’t Stop Talking – Susan Cain –Summary
- Peak: Secrets from the New Science of Expertise– Anders Ericsson –Summary
- Flow: The Psychology of Optimal Experience – Mihaly Csikszentmihalyi –Summary
YARPP List
Related posts:
- Will It Fly Summary (7/10)
- Modern Man in Search of a Soul Summary (8/10)
- Part 2: Stir Up The Transgressive and Taboo (The Art of Seduction)
- Chapter 19: And They Lived Happily Every After (Sapiens)
Keep Reading
Related Articles
Book Summaries
Chapter 9: Macro Analysis and the Fifth Basic Law (The Basic Laws of Human Stupidity)
> Law 5: A stupid person is the most dangerous type of person. The corollary of the Law is that ‘A stupid person is more dangerous than a bandit.’Carlo Cipolla, The Basic Laws of Human Stupidity The perfect bandit incurs a plus on his account equivalent to the minus caused to the other person.
Book Summaries
Anthony Gidens on Risk and Politics
Giddens is perhaps Britain’s leading sociologist, renowned especially for his theories of structuration and late modernity. He formed Polity Press in 1985 and became director of the LSE in 1997.
Book Summaries
Chapter 3: Life is Selection (The Lessons of History)
> Life is selection. Nature loves difference as the necessary material of selection and evolution. Nature does not care about any political manifesto’s that man has written. To nature, men are not free and is not born equal. Differentiation underlies evolution.
Book Summaries
The China Rules: Chinese Cyber Espionage Against the United States
This chapter from *The Perfect Weapon* provides an in-depth look at Chinese cyber espionage activities targeting the United States government and corporations in the early-to-mid 2010s. It reveals details about specific hacking groups, major breaches, and the U.S.