Books
- Cybersecurity Arm Wrestling: Winning the perpetual fight against crime by building a modern Security Operations Center (SOC), ISBN 979-8733168166
- Information Security Leaders Handbook – ISBN 1492160369
- HP-UX CSA official study guide, Prentice Hall PTR, August 2004 (ISBN 0131448544)
- Intrusion Detection with Snort, Prentice Hall PTR, May 2003 (ISBN 0131407333)
- Linux Development Platform, Prentice Hall PTR, Nov 2002 (ISBN 0130091154)
- Getting Ready with OpenID, ISBN 0972403124
- HP Certified: HP-UX System and Network Administration, Prentice Hall PTR, May 2000 (ISBN 0-13-018374-1)
- Solaris 8 Network Administrator Certification Training Guide (310-043), New Riders Publishing, 2001 (ISBN 1578702615)
Journals
- Getting started with R and R Studio – Linux Format 2016
- Gnuplot: A Powerful Data Visualization Tool – Linux Format 2016
- Big Data: Using Cloudera QuickStart VM to Build Hadoop Applications – Linux Format 2016
- Configuring RedHat High Availability Server, SysAdmin Journal, April 2001
- Open Source Real Time Solutions, SysAdmin Journal, December 2000
- Logical Volume Manager for Linux, SysAdmin Journal, August 2000
- Linux means business: A case study of Pakistan On-Line, Linux Journal, March 2000
- Linux Transparent Proxy, SysAdmin Journal, May 1999, pp 29
- Linux and Developing World, IEEE Software, January/February 1999, pp 58-64
- Distributed Network Security through RADIUS, SysAdmin Journal, October 1997, pp 63-70
Conferences/Seminars
- ISSA Summit 2019 – Security of Connected Vehicles
- Central Ohio ISSA Conference 2017
- Central Ohio ISSA Conference 2016
- Oil and Gas Security Summit 2015
- See More, Analyze More, or Both (best practices for defending networks) – Presentation to ISSA about managing Internet Security, October,15 2014
- Central Ohio ISSA Summit – May 5-6, 2014, Know Your Network – Using OpenAppID
- Encryption in Cloud – CloudExpo Silicon Valley in Santa Clara – November 2013
- Building Enterprise IDS Solutions, ISSA Security Summit, May 2011
- Techtarget webcast on Network Security using Snort
- ITEC Conference Cincinnati, OH: WiFi Security
- ITEC Conference Cincinnati, OH: Introduction to Firewalls
- University of Engineering and Technology Lahore: Seminar on emerging technologies
- COLUG seminar on Moodle
- COLUG seminar on OpenID
Training
I have provided training in the following areas.
- NIST Cyber Security Framework (CSF) Implementation
- Machine Learning for InfoSec professionals
- Building a modern Security Operations Center
- Getting started with Linux
- Using Snort, Splunk, SSH for Enterprise IDS
- Training course on Linux System Administration
- Training course on shell scripting
- Training course on host and network based IDS
- Training on using mind mapping tools