Edition de site web type e-commerce qui a pour objet de fournir l’accès à des formations vidéo traitant de produits informatiques. MISSION 1- Développement initial : + Design et Fonctionnalités + Création logo + Charte graphique + Accompagnement SEO + Accompagnement SEA + Plan marketing compl...
Hi We need help to write marketing content into French language: - Le conte...web (incluant les mots clés) - Charte éditoriale (incluant des personas) - un communiqué de presse - Plaquettes commerciales - Flyer - Campagnes marketing thèmes (cyber sécurité ...) - Affiches type (metro) - L'organisation d'un Événe...
Salam Mr. Bakri, Je suis Oussama, je travaille pour SEQUOIA Projects société belge leader dans le domaine des services IT et Cyber Sécurity. Dans le cadre de du développement de nos activités, nous sommes à la recherche de développeurs JAVA Senior et je viens de voir votre profil. Pourriez vous me communiquer vos coordonnées ou votr...
...ci-dessous, ainsi que leur e-mail, téléphone, titre, publication, sujet de prédilection et pseudonyme Twitter ; Sujet : informatique, données personnelles, objets connectés, cyber sécurité, VPN, droits numériques, hackers, fuites de données, en relation avec Apple, Android, iOS, Linux, Windows ; Type de média : pre...
...ci-dessous, ainsi que leur e-mail, téléphone, titre, publication, sujet de prédilection et pseudonyme Twitter ; Sujet : informatique, données personnelles, objets connectés, cyber sécurité, VPN, droits numériques, hackers, fuites de données, en relation avec Apple, Android, iOS, Linux, Windows ; Type de média : press...
créé un locale de NTIC ou un cyber café
Ligne Bleue Cyber est une agence de communication digitale basée au cœur de Paris dans le Silicon Sentier. Depuis plus de 13 ans notre département Digital conçoit et réalise de nouveaux produits. Nous lançons en 2014 deux nouveaux produits BtoB et BtoC autour de la notion de parcours du visiteur et des interfaces tactiles et objets connectés. ...
Voici les sujets des articles : - Taskforce de Europole contre les cyber criminels [se connecter pour voir l'URL] - Aux limites de l'impression 3D [se connecter pour voir l'URL] - Le controle des molecules au laser pour les ultra fast computers
A Literature Review APA format/style (6th edition) 2. 5-7 pages (excluding title page/reference page) 3. @ least 5 peer reviewed journal articles, @ least 2 social work textbooks, @ least 2 professional/appropriate website domains *The literature review provides a description, summary and evaluations of each source. Sample Outline Cyber bullying:
...already owned a shoptimized theme that I was not using from previous store, so I have been wanting to switch over to that theme and try it out for a while. At the same time, I have purchased Funnel Buildr 2.0 to be able to build funnels on shopify for my most sought after products and would like to create some sales funnels for Cyber week specials
...started a company which will be dealing with children online safety, cyber security awareness for parents, cyber security awareness for organisations and cyber security awareness for banking sectors and the public. tried to create a page but it was just bad hence I now want a professional to create for me an Instagram page and Facebook for...
For development of a Cyber SaaS application, we look for a designer that can take sketches and powerpoint slides and convert them to photoshop files ready for programmers to develop in Angular. 3-4 yeard of experience in applications development is mandatory
I am in need of a Cyber Security managed service promo video. I need this video to have a voice over that clearly states its for "Cyber Geeks Global". Here are the websites I want you to use for the information. [se connecter pour voir l'URL] , [se connecter pour voir l'URL] , [se connecter pour voir l'URL]
New Manga planned for release in 2019. Cyber Knights: Earth Antiquated. We already have a planned sequel and when we finish the first 100 pages a trail Anime deal. 6 to 8 panels a page. 100 pages per arc. This will be ongoing work with royalties and merchandising percentage. Keep your character rights! We have an amazing concept and script. Message
...to user Trading Exchange • A user will have an account + wallet for each currency. Multi currency Wallet • Login and Signup with 2 factor authentications • User account system with spending password • Deposit and Withdraws. The user will be able to deposit and withdraw Fiat and/or Crypto Currencies. • Establishing a user account system that allows
...Web Security and Penetration Test I am looking for a great person to complete my project. you have even penetrated server of a big website, then received Bounty!!! for example facebook、google、Microsoft and so on. This is very important . If you don't have the abilities, don't bid. Thanks. Because it is a very very difficult project....
Hi, we are a start-up in the field of cyber security. We are developing a system in the cyber security simulation field, and we are looking for a skilled full-stack programmer with deep knowledge in the following: react.js, node.js, python and mongodb. Cyber security knowledge is an advantage. The candidate should be familiar with admin panel development
Want to develop a piece of software that clients can pay for access to operate via web browser or mobile devices. Software would walk clients through all hazards, risk, vulnerability, and threat assessments. For Cyber and Physical Security. Clients would pay via credit card and would set up logins to use it. User management interface to close accounts
...Theme - Landing Pages (Wishpond, Leadpages) - Woocommerce - An eye for Design - Excellent Photoshop and Illustrator skills - Web Design - Web Development from scratch to launch - A good exposure to SEO (Offpage and Onpage) - Responsive Design (this is a must) About Us: We are a startup group of local, dedicated individuals that provide digital outsour...
A Supply chain product has been developed using Angular 1.5, Asp.net, MVC 4.0, C#, WCF .NET 4.5, ASP.Net core, oWin oAuth and secure token and SQL server 2014. We are looking for the Software Architect who can review the code and provide the improvement suggestion and later once reviewed and considered the improvement suggestion needs to plan for
Logo and business cards required for a new cyber security product. The logo should be produced first. When we are satisfied with the logo, the business cards can then be produced. Vector formats should be used. The logo should work well on different backgrounds (transparent, white, grey, black). It should also work well at different sizes - it should
details and content will share.
I need you to write some content for a website. my name is David Meredith. I'm looking to create content for my website. I'm building a Cyber security company and would like to see some samples of your work to see if this would be a good fit. Thank you in advance for your assistance. I look forward to hearing from you. Best, David
...for completing the design, development, testing and release of application projects and/or Cyber Security projects. If you are awarded the project, we will send you a Template which you can use to define the Objective, Background, Functional Requirement, and Non-Functional Requirement of the project scenario. We expect this to be a two, three, or maximum
I want to design a logo and a simple and effective user interface as per my needs for my cyber cafe website and android app
...to write 6 x articles that will be used on a security blog. This should be high quality as they are being presented by 'subject matter experts' and between 500-750 words. If you can present ideas for images to go with the articles that would be good also. These are not SEO articles, they will be to go into a publication, so I am more interested in quality
I need you to develop an analytics platform/application using AWS stack - the platform must be highly integrable with o... The platform must be highly restricted and secure. The platform must allow users to create workflows and custom dashboards. More details will be shared. People with some Cyber development background are encouraged to bid please.
Write a program that performs the 12-bit 4-round Simplified DES-Type Algorithm as introduced in Sec. 4.2. You can use any programming language. I will provide you with steps and equations in order to implement it.
I want a template/training plan that details how training has been delivered to my consultant over quarters (quarter has 3 months) and the training plan will include how it applies to his job duties (cyber security related). Job duties and required material for training plan will be shared. It should recite job duties and how training was delivered
This is for a cyber exercise scenario. I wanted to have a scenario where a malicious hacker is able to alter the applications program of payment system to cause disruption to the finance industry e.g. 1) Every online banking transaction that is initiated from a bank was amended to a default of $100 regardless of the amount, 2) All transferee and recipien...
Hi, We are having a Huge promotion for the month of November on our site and I want to have a 2 Minutes Video Ad. Our Price is $179 instead of $247 !! It's the BIGGEST DISCOUNT WE EVER MADE Our Product is [se connecter pour voir l'URL] Target audience is Shopify Store Owners, so we are doing this to get them ready for Black Friday/Cyber Monday. I want something
I need a business card design! Attention grabbing, creative and related to an infosec/cyber security company! (Hacker/security/networks,elegance,creativity)
Looking for a freelancer with experience in machine learning / Artificial intelligent & python, and who is happy to join an early-stage cybersecurity start-up based in the UK as a technical co-founder. You'd have to travel over to the UK if you're not here already.
... Internet, Cyber security, Networking, Cloud, RPA and AI sectors. We are looking for Senior Marketing Contacts. CEO CMO /Chief marketing Officer VP Marketing Senior VP Marketing Marketing Director Director of XXXXX Marketing Head of Marketing We are looking for these to be in London Ideally upto maybe 30 miles outside I have attached a template that
Could I see a play on the Color Red and white for the logo ? This is a Security/Training/Awareness/informative PRODUCT =============================================== The Name of my company is CyberWyce =========The company is about Cyber Security======= 1. Create a logo with: 2a. CyberWyce® Policy driven risk management framework...
three questions 1. Question 1; Choose one case of the f...Question 1; Choose one case of the following and what would you do? (3 points) 2. Question 2; Apply ethics in IT Professional environments? (3 points) 3. Question 3; Mention some cases of cyber attacks in kingdom of saudi arabia and anti-cyber attack law in kingdom of saudi arabia? (4 points
I need someone who is specialized in Linkedin Marketing and have strong portfolio and experience. Who has experience in Cyber Security and Risk & Compliance marketing We need someone who is expert in Linkedin marketing campaign and have risk and compliance (HIPPA, PCI, ISO, NIST etc.)experience