Rafeeq Rehman | Cyber | Automation | Digital

Rafeeq Rehman – Personal Blog

Skip to content
  • Home
  • CiSO MindMap
  • Published Books
  • Misc
  • About Blog
  • Subscribe to blog

Books

Following is a list of my published books, in no particular order.

Cybersecurity Arm Wrestling: Winning the perpetual fight against crime by building a modern Security Operations Center (SOC)

HP-UX CSA: Official Study Guide and Reference, 2nd Edition 


Intrusion Detection with Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP and ACID


HP Certified: HP-UX System Administration


Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models


The Linux Development Platform 


Solaris 8 Training Guide: Network Administration Certification


Get Ready for OpenID


Comments are closed.

  • Subscribe to Blog via Email

    Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,088 other subscribers
  • Follow me on Twitter

    My Tweets
  • Recent Posts

    • Four Questions CISOs Should Ask Themselves Everyday
    • Software Bill of Material and Vulnerability Management Blind Spots
    • Podcast: CISO MindMap and Recommendations for 2022-23
    • EBK-Cybersecurity: Understanding Stock Market Terminology
    • Essential Business Knowledge for InfoSec Professionals
  • Top Posts & Pages

    • CISO MindMap 2022: What do InfoSec Professionals really do?
    • CISO MindMap 2021: What do InfoSec professionals really do?
    • CISO Tools to Build (or Tweak) a Cybersecurity Roadmap, Create Business Case and Request Funding
    • PDF Version of Book: Cybersecurity Arm Wrestling available for download
    • Security Operations Center (SOC): Prioritizing Log Sources
    • CISO MindMap 2022 - Recommendations
    • Essential Business Knowledge for InfoSec Professionals
    • Four Questions CISOs Should Ask Themselves Everyday
    • What is a Next Generation SOC and does it Cost More?
    • Perspectives on Information Security Architecture
  • Subscribe to Blog via Email

    Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,088 other subscribers
  • Recent Posts

    • Four Questions CISOs Should Ask Themselves Everyday
    • Software Bill of Material and Vulnerability Management Blind Spots
    • Podcast: CISO MindMap and Recommendations for 2022-23
    • EBK-Cybersecurity: Understanding Stock Market Terminology
    • Essential Business Knowledge for InfoSec Professionals
  • Recent Posts

    • Four Questions CISOs Should Ask Themselves Everyday
    • Software Bill of Material and Vulnerability Management Blind Spots
    • Podcast: CISO MindMap and Recommendations for 2022-23
    • EBK-Cybersecurity: Understanding Stock Market Terminology
    • Essential Business Knowledge for InfoSec Professionals
  • Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
  • Tags

    API automation Book business ciso CISO MindMap cloud cloud security containers customer experience cybersecurity data DBIR Deception decision making DFIR digital transformation Edge Computing education forensic framework goal setting infosec innovation IoT IOT Security leadership logging MindMap mind map MQTT Open Source ransomware Reports ROSI SASE Security serverless SIEM SOAR SOC SOC conference strategy UEBA Zero Trust Architecture ZTA
  • Subscribe to Blog via Email

    Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,088 other subscribers
Rafeeq Rehman | Cyber | Automation | Digital
 

Loading Comments...