I'm Muhammad Haseeb, an experienced software and data engineer specializing in crafting efficient data-driven solutions using cutting-edge Datawarehouse technologies. My expertise encompasses a wide range of technologies, including Dotnet core and C# for robust development, SQL Server and Teradata for data handling, JSP, JDBC, and Hibernate Spring MVC for dynamic web experiences, and WSDL/SOAP and Rest Services for seamless communication. I also excel in JAX-WS and XML/XSLT for cutting-edge web solutions, as well as PHP, Python, Flask, and Django for versatile web development.
What truly sets me apart is my commitment to personalized engagement. I thrive on one-on-one interactions, diving deep into your projects, understanding your challenges, and collaboratively working towards effective solutions. I firmly believe in the mutual benefits of such partnerships, driving both revenue growth and cost optimization. From web design to programming and software development, I offer a comprehensive suite of services that cater to your unique needs.
Looking forward to connecting and exploring the endless possibilities together.
Website development, web design, Android and Hybrid Mobile Development
Mar 2012 - Şu anda
Currently Working as PHP, Java and Mobile Developer.
Working as part of Vendor Telecom Company, Development of VAS services and FS Project
Involved in pure hard core development and performed R&D task on new development technologies.
MS Information Security
COMSATS Institute of Information Technology, Pakistan 2013 - 2015
BS Computer Science
COMSATS Institute of Information Technology, Pakistan 2008 - 2012
Advanced Java EE Training
Advance Java EE Concepts, Design Patterns
Web Vulnerabilities – Attacks, Exploits and Mitigation
Malware Behavior Analysis Using Memory Forensics
Memory Forensics used to analyse the behavior of malware from within memory
Unfolded Competitive Legacy of Operating Systems
The Linux VS Windows is a topic for discussion since the beginning of computers. Years have passed but still it's hard to say which OS is the best on the other. We evaluate both operating systems at abstract level for better understanding what are the common features provided operating systems and where operating systems dominates each other.
Attribute Based Access Control for Outsourced Provenance Graph
Thesis on Access Control
Automation era prevailing in today’s environment is most exposing to cyber threats. Provenance captures the information needed to attribute ownership and determine, among other things, the quality of a particular data set. Provenance shows entire history from origin to present but an attacker try to exploit the provenance record by obtaining unauthorized access to the system. In this research work we introduced attribute based access control for provenance record.
Muhammad H. ile işiniz hakkında iletişime geçin
Sohbet üzerinden herhangi bir detayı tartışmak için giriş yapın.