Browse Summaries

Clear All

Filters

Publication Date

Browse by subject:

Management Leadership Career & Self Development Marketing Sales Human Resources Economics Entrepreneurship Finance Technology Innovation All Subjects


Sign up for our Professional or Premier plan and you'll receive all of these summaries plus much more.

Compare Plans

  • Image of Better By Mistake
    Image of Better By Mistake

    The Unexpected Benefits of Being Wrong

    by Alina Tugend

    Better by Mistake turns our cultural wisdom on its head to illustrate the downside of striving for perfection and the rewards of acknowledging and accepting mistakes and embracing the imperfection in all of us.

    View Details

  • Image of Extreme Trust
    Image of Extreme Trust

    Honesty as a Competitive Advantage

    by Martha Rogers, Don Peppers

    The authors of Extreme Trust, argue that the only sane response to these rising levels of transparency is to protect the interests of customers proactively,

    View Details

  • Image of How to Be Exceptional
    Image of How to Be Exceptional

    Drive Leadership Success by Magnifying Your Strengths

    by Robert H. Sherwin, Jr., Barbara A. Steel, John H. Zenger, Joseph R. Folkman

    To be exceptional as a leader requires a revolutionary approach to leadership development. In How to Be Exceptional: Drive Leadership Success by Magnifying Your Strengths, John H. Zenger, Joseph R. Folkman, Robert H. Sherwin, Jr., and Barbara A. Steel instruct leaders to focus not on their weaknesses but on their strengths and how to magnify them. An exceptional leader can increase employee engagement, productivity and profitability. These leadership gurus can show you how.

    View Details

  • Image of Care to Dare
    Image of Care to Dare

    Unleashing Astonishing Potential Through Secure Base Leadership

    by George Kohlrieser, Susan Goldsworthy, Duncan Coombe

    A secure base is a person, place, goal or object that provides a sense of protection, safety and caring. George Kohlrieser, Susan Goldsworthy and Duncan Coombe explain how to become an effective Secure Base Leader in Care to Dare: Unleashing Astonishing Potential Through Secure Base Leadership. The authors show how to tap into your own secure bases, past and present, and how to become a secure base for others thereby challenging yourself and others to exceed expectations.

    View Details

  • Image of The Pumpkin Plan
    Image of The Pumpkin Plan

    A Simple Strategy to Grow a Remarkable Business in Any Field

    by Mike Michalowicz

    Inspired by an article about how to grow a giant pumpkin, Mike Michalowicz modified the step-by-step approach to grow a business. Applying it successfully to building his own company, he was able to transform it into a multimillion-dollar industry leader. Michalowicz now lays out the process for others to follow in The Pumpkin Plan: A Simple Strategy to Grow a Remarkable Business in Any Field. Additional stories from other successful entrepreneurs who have followed the plan...

    View Details

  • Image of Winning With the P&G 99
    Image of Winning With the P&G 99

    99 Principles and Practices of Procter and Gamble's Success

    by Charles Decker

    Procter & Gamble sells its many products to five billion people worldwide. Its 1998 sales are about $37 billion. Each year this company wins recognition as one of the most admired in the United States. What accounts for this success? Following time-tested principles and practices. Believing the consumer is queen. Offering superior products. Shine in the development and marketing of new products. Here's a chance to learn about P&G's 99 brilliant principles and practices. They will help any compan

    View Details

  • Image of Risky Business
    Image of Risky Business

    How to Protect Yourself from Being Stalked, Conned, Libeled, or Blackmailed on the Web

    by Daniel Janal

    The Internet? It's great. It also can be dangerous. Janal tells you the many ways cybercriminals are attacking reputations, finances, and even the personal safety of individuals and companies. The possibilities are many, from fraudulent purchases of your products made with stolen credit cards to vicious rumors aired in newsgroups, and trade secrets leaking out. Read this and you'll be a trifle timorous, but far better prepared for the threats of this new technology.

    View Details

Recently Viewed Categories