Rafeeq Rehman | Cyber Security | Board Advisory

Rafeeq Rehman – Personal Blog

Skip to content
  • Home
  • CISO MindMap
  • Published Books
  • Misc
  • About This Blog
  • Subscribe to blog

Books

Following is a list of my published books, in no particular order.

Automation with Bash Shell Scripts: A brief and comprehensive journey for curious minds to unlock the full potential of computing.

book-automation-bash-shell

Cybersecurity Arm Wrestling: Winning the perpetual fight against crime by building a modern Security Operations Center (SOC)

HP-UX CSA: Official Study Guide and Reference, 2nd Edition 


Intrusion Detection with Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP and ACID


HP Certified: HP-UX System Administration


Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models


The Linux Development Platform 


Solaris 8 Training Guide: Network Administration Certification


Get Ready for OpenID


Comments are closed.

  • Subscribe to Blog via Email

    Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,894 other subscribers
  • Recent Posts

    • Strategies for Managing AI Application Cost
    • Eight Common Themes for AI Security Frameworks
    • Influence without Authority: Key Strategies for Executive Leaders
    • CISO MindMap 2025: What do InfoSec Professionals Really Do?
    • How to Use GenAI in Cybersecurity Operations
  • Top Posts & Pages

    • CISO MindMap 2025: What do InfoSec Professionals Really Do?
    • CISO MindMap 2024: What do InfoSec Professionals Really Do?
    • Eight Common Themes for AI Security Frameworks
    • Books
    • CISO MindMap 2023: What do InfoSec Professionals Really do?
    • CISO MindMap 2024: What do InfoSec Professionals Really Do?
    • Security Operations Center (SOC): Prioritizing Log Sources
    • Join a Community of Over 1,800 Cybersecurity Professionals by Subscribing to My Blog
    • CISO Tools to Build (or Tweak) a Cybersecurity Roadmap, Create Business Case and Request Funding
    • Using Snort as a PII Detection Tool
  • Subscribe to Blog via Email

    Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,894 other subscribers
  • Recent Posts

    • Strategies for Managing AI Application Cost
    • Eight Common Themes for AI Security Frameworks
    • Influence without Authority: Key Strategies for Executive Leaders
    • CISO MindMap 2025: What do InfoSec Professionals Really Do?
    • How to Use GenAI in Cybersecurity Operations
  • Recent Posts

    • Strategies for Managing AI Application Cost
    • Eight Common Themes for AI Security Frameworks
    • Influence without Authority: Key Strategies for Executive Leaders
    • CISO MindMap 2025: What do InfoSec Professionals Really Do?
    • How to Use GenAI in Cybersecurity Operations
  • Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
  • Tags

    AI API architecture Book business ciso CISO MindMap cloud customer experience cybersecurity data DBIR decision making digital transformation education framework GenAI goal setting information security programs infosec innovation IoT IOT Security leadership LLM logging microservices MindMap mind map ml MQTT Open Source ransomware Reports risk assessment risk management ROSI SASE Security servicemesh SIEM SOC strategy success vulnerability
  • Subscribe to Blog via Email

    Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,894 other subscribers
Rafeeq Rehman | Cyber Security | Board Advisory
 

Loading Comments...