Rafeeq Rehman | Cyber | Automation | Digital

Rafeeq Rehman – Personal Blog

Skip to content
  • Home
  • CiSO MindMap
  • Published Books
  • Misc
  • About Blog
  • Subscribe to blog

Books

Following is a list of my published books, in no particular order.

Cybersecurity Arm Wrestling: Winning the perpetual fight against crime by building a modern Security Operations Center (SOC)

HP-UX CSA: Official Study Guide and Reference, 2nd Edition 


Intrusion Detection with Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP and ACID


HP Certified: HP-UX System Administration


Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models


The Linux Development Platform 


Solaris 8 Training Guide: Network Administration Certification


Get Ready for OpenID


Comments are closed.

  • Subscribe to Blog via Email

    Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 917 other subscribers

  • Follow me on Twitter

    My Tweets
  • Recent Posts

    • CISO MindMap 2022 – Recommendations
    • CISO MindMap 2022: What do InfoSec Professionals really do?
    • Essential skills to start any career path in information security
    • Why we need to redefine CIA triad of information security
    • SIX MODELS FOR A SUCCESSFUL CAREER
  • Top Posts & Pages

    • Six Essential Ingredients for Building a Successful Security Operations Center (SOC)
    • Latest Update to CISO Responsibilities Mind Map
    • Building a Successful Security Operations Center Part 3: SOC Budget Calculator
    • CISO MindMap 2018 – What Do InfoSec Professionals Really Do?
    • What is Return on Security Investment (ROSI) Anyway?
    • CISO MindMap 2020: What do InfoSec professionals really do?
    • CISO MindMap 2019: What Do InfoSec Professionals Really Do?
    • Verizon White Paper: CISO’s Guide to Cloud Security
    • CISO Tools to Build (or Tweak) a Cybersecurity Roadmap, Create Business Case and Request Funding
    • Using Snort as a PII Detection Tool
  • Subscribe to Blog via Email

    Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 917 other subscribers

  • Recent Posts

    • CISO MindMap 2022 – Recommendations
    • CISO MindMap 2022: What do InfoSec Professionals really do?
    • Essential skills to start any career path in information security
    • Why we need to redefine CIA triad of information security
    • SIX MODELS FOR A SUCCESSFUL CAREER
  • Recent Posts

    • CISO MindMap 2022 – Recommendations
    • CISO MindMap 2022: What do InfoSec Professionals really do?
    • Essential skills to start any career path in information security
    • Why we need to redefine CIA triad of information security
    • SIX MODELS FOR A SUCCESSFUL CAREER
  • Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
  • Tags

    API awareness program Book budget business ciso CISO Book CISO MindMap cloud cloud security customer experience cybersecurity data DBIR decision making digital transformation education encryption framework goal setting information framework Information Security Architecture information security programs information security roadmap information security strategy infosec innovation IoT IOT Security leadership logging MindMap mind map MQTT Open Source PCI PII ransomware Reports ROSI SASE Security Snort SOC strategy
  • Subscribe to Blog via Email

    Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 917 other subscribers

Rafeeq Rehman | Cyber | Automation | Digital
 

Loading Comments...