Publication

Technical Papers:

  1. Hitting the Target with Information Security, GRCG Journal, July 2010
  2. Book Review: Ontologies for Software Engineering and Software Technology
  3. Cyberspace, Cyberterrorism and Information Warfare: A Perfect Recipe for Confusion, 6th Worldwide Security Conference, Brussels, February 2009.
  4. Google Hacking, December 2008
  5. Information Technology Era magazine – How to Write a Cyber Forensic report, September, 2008
  6. Information Technology Era magazine – Live Response Methodologies & Evidence Gathering, August 2008
  7. Information Technology Era magazine – Windows Registry Analysis in Windows operating system for forensic investigation, July 2008
  8. Information Technology Era magazine – Memory dump in Windows operating system for forensic investigation, June 2008
  9. Security Middle East magazine – IT security, 2007
  10. Electronic & Computer Science Magazine – Writing three technical papers about hardware locks and viruses, 1999
  11. Plastics Industry Magazine (PIM) – Writing & Translating more than 50 papers about computer, automation, Internet and industrial software, 2001
  12. Silicone Magazine – Writing two technical papers about Windows and Internet Explorer security, 2001

Training Manuals:

  1. Cyber Crime Investigation Process
  2. Investigation Network Traffic
  3. Steganography
  4. Image File Forensic
  5. Investigation Web Attacks
  6. Investigation Internet Crimes
  7. Network Forensics and Logs
  8. Investigation DoS Attacks
  9. Windows Forensic
  10. Tracking E-mails and Investigation E-Mail Crimes

Books:

  1. CEH Exam Self Assessment
  2. Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts
  3. Computer Networking Handbook