...outils suivants : • Langages : HTML, CSS, JSP, XML ; • Logiciels : WORDPRESS • Photoshop/Illustrator/InDesign • Sketch, After Effects et Premiere sont un plus • Secteur : Cyber sécurité • Fonction : Conception Web (ergonomies, infographie, webmaster...) • Démarrage : Au plus tôt • Durée : Inférieure ...
Hi We need help to write marketing content into French language: - Le conte...web (incluant les mots clés) - Charte éditoriale (incluant des personas) - un communiqué de presse - Plaquettes commerciales - Flyer - Campagnes marketing thèmes (cyber sécurité ...) - Affiches type (metro) - L'organisation d'un Événe...
Salam Mr. Bakri, Je suis Oussama, je travaille pour SEQUOIA Projects société belge leader dans le domaine des services IT et Cyber Sécurity. Dans le cadre de du développement de nos activités, nous sommes à la recherche de développeurs JAVA Senior et je viens de voir votre profil. Pourriez vous me communiquer vos coordonnées ou votr...
...ci-dessous, ainsi que leur e-mail, téléphone, titre, publication, sujet de prédilection et pseudonyme Twitter ; Sujet : informatique, données personnelles, objets connectés, cyber sécurité, VPN, droits numériques, hackers, fuites de données, en relation avec Apple, Android, iOS, Linux, Windows ; Type de média : pre...
...ci-dessous, ainsi que leur e-mail, téléphone, titre, publication, sujet de prédilection et pseudonyme Twitter ; Sujet : informatique, données personnelles, objets connectés, cyber sécurité, VPN, droits numériques, hackers, fuites de données, en relation avec Apple, Android, iOS, Linux, Windows ; Type de média : press...
créé un locale de NTIC ou un cyber café
Ligne Bleue Cyber est une agence de communication digitale basée au cœur de Paris dans le Silicon Sentier. Depuis plus de 13 ans notre département Digital conçoit et réalise de nouveaux produits. Nous lançons en 2014 deux nouveaux produits BtoB et BtoC autour de la notion de parcours du visiteur et des interfaces tactiles et objets connectés. ...
Voici les sujets des articles : - Taskforce de Europole contre les cyber criminels [se connecter pour voir l'URL] - Aux limites de l'impression 3D [se connecter pour voir l'URL] - Le controle des molecules au laser pour les ultra fast computers
I have bought an ecommerce store on shopify. I...while. At the same time, I have purchased Funnel Buildr 2.0 to be able to build funnels on shopify for my most sought after products and would like to create some sales funnels for Cyber week specials. Trying to optimize my store with best theme and conversion techniques to get the most out of it.
Good day recently started a company which will be dealing with children online safety, cyber security awareness for parents, cyber security awareness for organisations and cyber security awareness for banking sectors and the public. tried to create a page but it was just bad hence I now want a professional to create for me an Instagram page and Facebook
For development of a Cyber SaaS application, we look for a designer that can take sketches and powerpoint slides and convert them to photoshop files ready for programmers to develop in Angular. 3-4 yeard of experience in applications development is mandatory
I am in need of a Cyber Security managed service promo video. I need this video to have a voice over that clearly states its for "Cyber Geeks Global". Here are the websites I want you to use for the information. [se connecter pour voir l'URL] , [se connecter pour voir l'URL] , [se connecter pour voir l'URL]
New Manga planned for release in 2019. Cyber Knights: Earth Antiquated. We already have a planned sequel and when we finish the first 100 pages a trail Anime deal. 6 to 8 panels a page. 100 pages per arc. This will be ongoing work with royalties and merchandising percentage. Keep your character rights! We have an amazing concept and script. Message
...system. • Referral Program • Android – iOS Apps and Update support • Security Aspects – CloudFlare – to mitigate DDoS attacks • Blog • Notification Ticker • Day and Light UI mode • Data Center Requirements and Deployment support. • It should be noted that - since Security aspect of the exchange is our number 1 prior...
Your ability determines how much you can earn！！ Web Security and Penetration Test I am looking for a great person to complete my project. you have even penetrated server of a big website, then received Bounty!!! for example facebook、google、Microsoft and so on. This is very important . If you don't have the abilities, don't bid. Thanks. Because it is
Hi, we are a start-up in the field of cyber security. We are developing a system in the cyber security simulation field, and we are looking for a skilled full-stack programmer with deep knowledge in the following: react.js, node.js, python and mongodb. Cyber security knowledge is an advantage. The candidate should be familiar with admin panel development
...can pay for access to operate via web browser or mobile devices. Software would walk clients through all hazards, risk, vulnerability, and threat assessments. For Cyber and Physical Security. Clients would pay via credit card and would set up logins to use it. User management interface to close accounts or block access needed Storage of results online
...environment. We are aiming to boost our sales and expand our client base by 2019 and you'll grow as we grow. When you apply, provide the following: - Cover letter - Full Name - Email Address - Resume - Skype ID - Portfolio (if you have one) - Rate per hour In your application, put in the subject line "Hello! I Am Your Cyber Deity". We look forward to seeing
...the improvement suggestion needs to plan for implementation. 1. Security - review and identify the gaps or improvement point for eliminating the security gaps. this shall be consider for Cyber Security, improper Code, config settings, SQL Server, WCF and Application specific security. 2. Angular 1.5 - Callback & performance issues - review and provide
Logo and business cards required for a new cyber security product. The logo should be produced first. When we are satisfied with the logo, the business cards can then be produced. Vector formats should be used. The logo should work well on different backgrounds (transparent, white, grey, black). It should also work well at different sizes - it should
details and content will share.
I need you to write some content for a website. my name is David Meredith. I'm looking to create content for my website. I'm building a Cyber security company and would like to see some samples of your work to see if this would be a good fit. Thank you in advance for your assistance. I look forward to hearing from you. Best, David
...Science/IT engineering students. These Project Scenarios will be given to students for completing the design, development, testing and release of application projects and/or Cyber Security projects. If you are awarded the project, we will send you a Template which you can use to define the Objective, Background, Functional Requirement, and Non-Functional
I want to design a logo and a simple and effective user interface as per my needs for my cyber cafe website and android app
Hello, thanks for looking at this bid request. I am looking for someone to write 6 x articles that will be used on a security blog. This should be high quality as they are being presented by 'subject matter experts' and between 500-750 words. If you can present ideas for images to go with the articles that would be good also. These are not SEO articles
I need you to develop an analytics platform/application using AWS stack - the platform must be highly integrable with o... The platform must be highly restricted and secure. The platform must allow users to create workflows and custom dashboards. More details will be shared. People with some Cyber development background are encouraged to bid please.
Write a program that performs the 12-bit 4-round Simplified DES-Type Algorithm as introduced in Sec. 4.2. You can use any programming language. I will provide you with steps and equations in order to implement it.
...that details how training has been delivered to my consultant over quarters (quarter has 3 months) and the training plan will include how it applies to his job duties (cyber security related). Job duties and required material for training plan will be shared. It should recite job duties and how training was delivered and Right to control was established
This is for a cyber exercise scenario. I wanted to have a scenario where a malicious hacker is able to alter the applications program of payment system to cause disruption to the finance industry e.g. 1) Every online banking transaction that is initiated from a bank was amended to a default of $100 regardless of the amount, 2) All transferee and recipients
...! It's the BIGGEST DISCOUNT WE EVER MADE Our Product is [se connecter pour voir l'URL] Target audience is Shopify Store Owners, so we are doing this to get them ready for Black Friday/Cyber Monday. I want something simple, easy to watch with CLEAR MESSAGING. I want them to KNOW that The BEST Shopify Theme on the Market is at an insanely amazing price. Thanks
I need a business card design! Attention grabbing, creative and related to an infosec/cyber security company! (Hacker/security/networks,elegance,creativity)
Looking for a freelancer with experience in machine learning / Artificial intelligent & python, and who is happy to join an early-stage cybersecurity start-up based in the UK as a technical co-founder. You'd have to travel over to the UK if you're not here already.
I need someone to research Contacts within Software, Internet, Cyber security, Networking, Cloud, RPA and AI sectors. We are looking for Senior Marketing Contacts. CEO CMO /Chief marketing Officer VP Marketing Senior VP Marketing Marketing Director Director of XXXXX Marketing Head of Marketing We are looking for these to be in London Ideally upto maybe
Could I see a play on the Color Red and white for the logo ? This is a Security/Training/Awareness/informative PRODUCT =============================================== The Name of my company is CyberWyce =========The company is about Cyber Security======= 1. Create a logo with: 2a. CyberWyce® Policy driven risk management framework 2b. CyberWyce™
three questions 1. Question 1; Choose one case of the following and what would you do? (3 ...following and what would you do? (3 points) 2. Question 2; Apply ethics in IT Professional environments? (3 points) 3. Question 3; Mention some cases of cyber attacks in kingdom of saudi arabia and anti-cyber attack law in kingdom of saudi arabia? (4 points
I need someone who is specialized in Linkedin Marketing and have strong portfolio and experience. Who has experience in Cyber Security and Risk & Compliance marketing We need someone who is expert in Linkedin marketing campaign and have risk and compliance (HIPPA, PCI, ISO, NIST etc.)experience
...writer with experience of cyber security to write 5 articles a week. These will be focused on the following topics: - cyber security standards - information security compliance - how to protect a company The articles will be aimed at a general audience but must demonstrate some level of expertise with technology and cyber security. Work arrang...
build a website in which the website should be able to find all the list of the vulnerabilities present in the website entered in the search box using vulnerabilities searching tools ..
Hello I need an expert on setting my servers, firewall and cyber security. I have a website that I host on godaddy. I recently bought a Linux VPS. I need someone to configure my VPS to host my website.