Skip to main content

Books

Browse 23 books distilled into 278 actionable agent skills.

23 results
Fundamentals of Software Architecture cover

Fundamentals of Software Architecture

Mark Richards, Neal Ford

Software Architecture
software-architectsenior-developertech-lead

The book's specific scoring models, decision frameworks, and taxonomy — architecture characteristics taxonomy, quantum analysis methodology, style-characteristic star ratings, modularity metrics (LCOM, distance from main sequence), risk matrix scoring, and the 8 fallacies of distributed computing as a feasibility checklist.

19 skills
+72%
Solves
Selecting the right architecture style without systematic evaluation
Identifying which quality attributes actually matter for a given system
Quantifying modularity health with metrics instead of intuition
Designing automated governance that prevents architecture erosion
Documenting architecture decisions with full justification
+5 more
Patterns of Enterprise Application Architecture cover

Patterns of Enterprise Application Architecture

Martin Fowler, David Rice, Matthew Foemmel, Edward Hieatt, Robert Mee, Randy Stafford

Enterprise Architecture
16 skills
+55%
Working Effectively with Legacy Code cover

Working Effectively with Legacy Code

Michael C. Feathers

Legacy Code
16 skills
+73%
Design Patterns cover

Design Patterns

Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides

Design Patterns
software-developersoftware-engineer

The book's 23 patterns with their specific applicability criteria, consequences, and implementation pitfalls. General AI knows pattern names but not the nuanced decision framework: WHEN to use each pattern (applicability), WHEN NOT to (consequences/trade-offs), and HOW to implement correctly (implementation hints specific to each pattern). The 'Related Patterns' cross-references and the case study showing 8 patterns working together are knowledge an LLM doesn't reliably have.

15 skills
+33%
Solves
Recognizing which design pattern fits a specific code smell or design problem
Choosing between similar patterns (e.g., Strategy vs State, Adapter vs Bridge, Decorator vs Proxy)
Implementing a pattern correctly with proper participant roles and collaborations
Understanding consequences and trade-offs before committing to a pattern
Combining multiple patterns to solve complex design problems (as demonstrated in the Lexi case study)
+2 more
Building Secure and Reliable Systems cover

Building Secure and Reliable Systems

Heather Adkins, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea, Adam Stubblefield

Security
software-engineersite-reliability-engineersecurity-engineer

Google-scale operational wisdom: concrete frameworks for least privilege design, resilience patterns (defense in depth, blast radius control, failure domains), secure deployment pipelines with provenance verification, and crisis management playbooks — all treating security and reliability as inseparable.

14 skills
+49%
Solves
Designing systems where security and reliability reinforce each other instead of conflicting
Classifying access and applying least privilege without destroying developer productivity
Building resilience through defense in depth, controlled degradation, and blast radius limitation
Creating structured incident response and recovery plans before disasters strike
Deploying code securely with provenance verification and rollback strategies
+3 more
Designing Data-Intensive Applications cover

Designing Data-Intensive Applications

Martin Kleppmann

Data Systems
backend-engineersoftware-architectdata-engineer

Deep trade-off analysis frameworks that connect theoretical guarantees (linearizability, serializability, exactly-once) to practical system behavior and failure modes. General AI knows WHAT these concepts are but not HOW to systematically evaluate which combination fits a specific workload.

14 skills
+68%
Solves
Choosing between replication strategies (single-leader, multi-leader, leaderless) for a specific workload
Selecting the right consistency and isolation guarantees without over- or under-provisioning
Designing partitioning schemes that avoid hotspots and support required query patterns
Choosing between batch and stream processing for data pipeline requirements
Evaluating data model fit (relational, document, graph) for specific access patterns
+4 more
Fanatical Prospecting cover

Fanatical Prospecting

Jeb Blount

Sales
14 skills
+73%
The 1-Page Marketing Plan cover

The 1-Page Marketing Plan

Allan Dib

Marketing
13 skills
+76%
Traction cover

Traction

Gabriel Weinberg, Justin Mares

Startup Growth
13 skills
The Web Application Hacker's Handbook cover

The Web Application Hacker's Handbook

Dafydd Stuttard and Marcus Pinto

Web Security
penetration-testersecurity-engineerapplication-security-analyst

Structured per-vulnerability-class detection methodologies with specific test steps, filter bypass techniques, language-specific dangerous API catalogs, and the comprehensive 13-area testing methodology from Chapter 21 — knowledge that general AI has only in fragments, not as coherent executable procedures.

13 skills
+48%
Solves
Conducting systematic web application security assessments without missing vulnerability categories
Reviewing source code for security flaws across multiple languages (Java, PHP, ASP.NET, Perl, JavaScript)
Detecting and verifying SQL injection, XSS, CSRF, and other injection vulnerabilities with specific test procedures
Identifying authentication, session management, and access control weaknesses
Analyzing application logic for business logic flaws that automated tools miss
+3 more
INSPIRED: How to Create Tech Products Customers Love cover

INSPIRED: How to Create Tech Products Customers Love

Marty Cagan

Product Management
product-managerproduct-leader

Cagan's specific discovery technique taxonomy (framing, planning, ideation, prototyping, testing — mapped to 4 risk types), team topology principles for product organizations, and the anti-pattern catalog of failed product efforts that general AI would not systematically apply

12 skills
+51%
Solves
Selecting the right discovery technique for a given product risk (value vs usability vs feasibility vs business viability)
Assessing whether a product team is structured for empowerment or operating as a feature team
Framing product opportunities with structured assessments instead of ad-hoc business cases
Transitioning from feature roadmaps to objective-based product strategy with OKRs
Managing stakeholder relationships and building high-integrity commitments
+2 more
The Craft of Research, Fourth Edition cover

The Craft of Research, Fourth Edition

Wayne C. Booth, Gregory G. Colomb, Joseph M. Williams, Joseph Bizup, and William T. FitzGerald

Research Methodology
researcheracademic-writergraduate-student

Booth et al.'s specific frameworks (3-step problem formula, warrant logic, problem structure taxonomy, introduction architecture) that general AI doesn't systematically apply — especially the 'So what?' cascade for establishing significance and the claim-warrant connection testing

12 skills
+45%
Solves
Turning a vague topic into a focused, significant research question
Structuring an argument with explicit logical connections (not just assertions)
Anticipating and addressing reader objections before they arise
Writing introductions that establish context, state the problem, and preview the response
Evaluating evidence quality and distinguishing evidence from reasons
+3 more
Hacking Growth cover

Hacking Growth

Sean Ellis, Morgan Brown

Growth
11 skills
+35%
SPIN Selling cover

SPIN Selling

Neil Rackham

Sales
11 skills
+28%
Influence: The Psychology of Persuasion cover

Influence: The Psychology of Persuasion

Robert B. Cialdini

Persuasion
marketersales-professionalcopywriterproduct-manager

Cialdini's 6-principle taxonomy (reciprocity, commitment/consistency, social proof, authority, liking, scarcity) with specific named techniques (door-in-the-face, foot-in-the-door, low-ball, rejection-then-retreat) plus defense strategies for each. General AI knows these terms but doesn't systematically apply all 6 as a diagnostic framework or know the specific exploitation/defense patterns from the research.

10 skills
+43%
Solves
Marketing copy that doesn't convert because it relies on features instead of influence principles
Sales emails that get ignored because they don't trigger reciprocity or commitment patterns
Landing pages missing social proof, authority signals, or scarcity elements
Inability to diagnose which influence principle is being used against you in a negotiation
No systematic framework for auditing persuasive content — just ad hoc 'does this feel right'
+3 more
Made to Stick cover

Made to Stick

Chip Heath, Dan Heath

Communication
10 skills
+79%
Make It Stick: The Science of Successful Learning cover

Make It Stick: The Science of Successful Learning

Peter C. Brown, Henry L. Roediger III, Mark A. McDaniel

Learning Science
studentteachercorporate-trainer

Specific anti-patterns (cramming, rereading, learning styles myth) that general AI might actually reinforce, plus structured protocols for spacing, interleaving, and calibration that require precise scheduling logic the book provides

10 skills
+39%
Solves
Designing study schedules that use spaced retrieval practice instead of cramming
Creating self-quizzing and practice-testing materials from learning objectives
Auditing training programs for ineffective practices (massed practice, learning styles, passive review)
Building interleaved practice sequences that mix related topics optimally
Calibrating self-assessment accuracy to avoid illusions of knowing
+2 more
Refactoring: Improving the Design of Existing Code cover

Refactoring: Improving the Design of Existing Code

Martin Fowler

Refactoring
10 skills
+45%
The Art of Strategy cover

The Art of Strategy

Avinash K. Dixit & Barry J. Nalebuff

Game Theory
business-strategistnegotiatormanagerconsultant

Formal game-theoretic frameworks (backward induction, Nash equilibrium, mixed strategies, commitment analysis, information asymmetry assessment) that general AI doesn't apply systematically to real situations

10 skills
+19%
Solves
Analyzing multi-player strategic situations to find optimal moves
Preparing for negotiations with BATNA analysis and pie measurement
Evaluating whether commitments, threats, or promises are credible
Deciding between cooperation and competition in repeated interactions
Designing incentive structures that align behavior with goals
+4 more
The Challenger Sale cover

The Challenger Sale

Matthew Dixon, Brent Adamson

Sales
10 skills
+65%
The Mom Test cover

The Mom Test

Rob Fitzpatrick

Customer Discovery
founderentrepreneurproduct-manager

The Mom Test's specific rules for question quality (talk about their life not your idea, ask about past specifics not future generics, talk less and listen more) plus its commitment/advancement framework for distinguishing real interest from politeness — general AI gives generic interview advice but doesn't apply these specific diagnostic rules

9 skills
+76%
Solves
Asking biased questions that invite false positive answers
Mistaking compliments and enthusiasm for product validation
Not knowing which questions matter most (the 'big 3' learning goals)
Failing to push for concrete commitments after product meetings
Choosing the wrong customer segment to validate first
+4 more
$100M Offers cover

$100M Offers

Alex Hormozi

Offers
8 skills
+38%
Never Split the Difference cover

Never Split the Difference

Chris Voss

Negotiation
sales-professionalbusiness-ownerconsultantmanager

FBI-developed techniques that exploit cognitive biases and emotional dynamics — tactical empathy, calibrated questions, the Ackerman bargaining model. These are specific processes with exact wording templates, not general advice. General AI knows 'ask open-ended questions'; these skills know WHICH questions, in WHAT order, with WHAT follow-up labels.

8 skills
+73%
Solves
Preparing for high-stakes negotiations without a structured framework
Getting counterparts to reveal hidden motivations and constraints
Handling aggressive or emotional counterparts without escalation
Bargaining on price without arbitrary splitting or premature concessions
Ensuring deal execution and follow-through after agreement
+3 more