Publications

Books

  1. Cybersecurity Arm Wrestling: Winning the perpetual fight against crime by building a modern Security Operations Center (SOC), ISBN 979-8733168166
  2. Information Security Leaders Handbook – ISBN 1492160369
  3. HP-UX CSA official study guide, Prentice Hall PTR, August 2004 (ISBN 0131448544)
  4. Intrusion Detection with Snort, Prentice Hall PTR, May 2003 (ISBN 0131407333)
  5. Linux Development Platform, Prentice Hall PTR, Nov 2002 (ISBN 0130091154)
  6. Getting Ready with OpenID, ISBN 0972403124
  7. HP Certified: HP-UX System and Network Administration, Prentice Hall PTR, May 2000 (ISBN 0-13-018374-1)
  8. Solaris 8 Network Administrator Certification Training Guide (310-043), New Riders Publishing, 2001 (ISBN 1578702615)

Journals

  • Getting started with R and R Studio – Linux Format 2016
  • Gnuplot: A Powerful Data Visualization Tool – Linux Format 2016
  • Big Data: Using Cloudera QuickStart VM to Build Hadoop Applications – Linux Format 2016
  • Configuring RedHat High Availability Server, SysAdmin Journal, April 2001
  • Open Source Real Time Solutions, SysAdmin Journal, December 2000
  • Logical Volume Manager for Linux, SysAdmin Journal, August 2000
  • Linux means business: A case study of Pakistan On-Line, Linux Journal, March 2000
  • Linux Transparent Proxy, SysAdmin Journal, May 1999, pp 29
  • Linux and Developing World, IEEE Software, January/February 1999, pp 58-64
  • Distributed Network Security through RADIUS, SysAdmin Journal, October 1997, pp 63-70

Conferences/Seminars

  • ISSA Summit 2019 – Security of Connected Vehicles
  • Central Ohio ISSA Conference 2017
  • Central Ohio ISSA Conference 2016
  • Oil and Gas Security Summit 2015
  • See More, Analyze More, or Both (best practices for defending networks) – Presentation to ISSA about managing Internet Security, October,15  2014
  • Central Ohio ISSA Summit – May 5-6, 2014, Know Your Network – Using OpenAppID
  • Encryption in Cloud – CloudExpo Silicon Valley in Santa Clara – November 2013
  • Building Enterprise IDS Solutions, ISSA Security Summit, May 2011
  • Techtarget webcast on Network Security using Snort
  • ITEC Conference Cincinnati, OH: WiFi Security
  • ITEC Conference Cincinnati, OH: Introduction to Firewalls
  • University of Engineering and Technology Lahore: Seminar on emerging technologies
  • COLUG seminar on Moodle
  • COLUG seminar on OpenID

Training

I have provided training in the following areas.

  • NIST Cyber Security Framework (CSF) Implementation
  • Machine Learning for InfoSec professionals
  • Building a modern Security Operations Center
  • Getting started with Linux
  • Using Snort, Splunk, SSH for Enterprise IDS
  • Training course on Linux System Administration
  • Training course on shell scripting
  • Training course on host and network based IDS
  • Training on using mind mapping tools

Comments are closed.