Tuning solaris siteminder policy serveremplois

Filtrer

Mes recherches récentes
Filtrer par :
Budget
à
à
à
Type
Compétences
Langues
    État du travail
    11,376 tuning solaris siteminder policy server travaux trouvés au tarif de EUR

    Bonjour j'ai un site de reservation avec paiement pour des apparthotel, ma solution interne est SiteMinder et je souhaiterai un plugin ou autre pour synchroniser mon agenda siteminder et celui de mon site wordpress donc dans les 2 sens . Quelqu'un serai faire ça?

    €130 (Avg Bid)
    €130 Offre moyenne
    4 offres

    Bonjour, j'ai besoin de quelqu'in qui sais écrire sans faute d'orthographe et avec une clarté unique les différentes ...de quelqu'in qui sais écrire sans faute d'orthographe et avec une clarté unique les différentes rubriques d'un site de fond d'écran. Les rubriques en question son : Privacy Policy, Terms of...

    €34 (Avg Bid)
    €34 Offre moyenne
    3 offres
    €13 / hr Offre moyenne
    1 offres
    Website-Privacy Policy S'est terminé left

    As discussed.

    €50 - €50
    €50 - €50
    0 offres

    MySQl / Apache Tuning / etc

    €217 / hr (Avg Bid)
    €217 / hr Offre moyenne
    1 offres

    Bonjour,rnJe cherche à crée un thème Magento complet sur le sujet " 50 cc Sportive-tuning-run" typique au site suivant : [se connecter pour voir l'URL] " ect..rnrnJe n'ais pas un gros budget. proposez alors vos tarifs MercirnrnMagento 1.8

    €33 - €272
    €33 - €272
    0 offres

    I have a 35 page Policy and Procedure manual in PDF form. I'd like it in Word format.

    €71 (Avg Bid)
    €71 Offre moyenne
    2 offres

    We have a WordPress website [se connecter pour voir l'URL] that we would like to speed up as the current google perf...a WordPress website [se connecter pour voir l'URL] that we would like to speed up as the current google performance results are not very good. We need an expert in performance tuning to get the site both desktop and mobile running their best.

    €134 (Avg Bid)
    €134 Offre moyenne
    77 offres
    RaceME - Creating an article 5 jours left
    VERIFIÉ

    Article - (Bes...article needs to help people find the best tuner for their Dodge RAM 6.7L cummins as well as product reviews. Reviews must be natural. The article also has the benefits of tuner tuning into your car. E.g. do not break the car's warranty, increase the performance of the car, set the back-up and return to its original state and more ...

    €65 (Avg Bid)
    €65 Offre moyenne
    28 offres

    Iam looking for someone who creates for me eBay description. Requirements are: - Write description / no spelling errors. Knowledge about technical English. - Design the eBay description. HTML 5 .. etc - Copy writing - Article Writing This job is longterm

    €5 / hr (Avg Bid)
    €5 / hr Offre moyenne
    10 offres

    I am growing my online business and I am building an opt-in page for my free product to grow...online business and I am building an opt-in page for my free product to grow my email list. I would like someone who understand legal requirements for these to write my Privacy policy and Terms and Conditions to be compliant with GDPR and other requirements.

    €162 (Avg Bid)
    €162 Offre moyenne
    27 offres

    need 1 PAF Template, 1 fillable/expense reimbursement form, 1 memo template for policy reinforcement and 1 memo template for welcoming new hires. Customized with our logo.

    €275 (Avg Bid)
    €275 Offre moyenne
    12 offres

    HTML website 90% done. Needs tweaking. Needs to run perfectly on all platforms. Need to properly set up gallery area.

    €106 (Avg Bid)
    €106 Offre moyenne
    19 offres

    Good morning, I am looking for an good experimented writer to create for my business al the regulations policy for my business including the website and the management system. I will discuss more details in private with the winner. My maximum offer is the best I can do so don`t bid if you believe that you may charge me more.

    €57 (Avg Bid)
    €57 Offre moyenne
    21 offres
    React Guru Needed 4 jours left

    ...image. They need a bit of cleanup and tuning for iOS We will release this react universal toolkit to open source as soon as this upgrade is completed. Then the developer will work on our actual application modules which: - use the UI components - user the datastore module: the datastore sync user data with our server, sends API calls (no response data)

    €30 / hr (Avg Bid)
    €30 / hr Offre moyenne
    34 offres

    ...practices. • Great understanding of object-oriented designs and principles. • Experience with offline storage, threading, and performance tuning. • Experience building apps which communicate with a server via REST web services. • Excellent communication skills. • Ability to work in the US time zone from time to time. • Familiar...

    €33 / hr (Avg Bid)
    €33 / hr Offre moyenne
    34 offres

    Vendor management policy & procedure writing and editing

    €73 (Avg Bid)
    €73 Offre moyenne
    15 offres
    Trophy icon Logo - Sky Racing Suspension 3 jours left

    I...logo with brand name SKY RACING SUSPENSION. The color should be red, blue, black and grey or any combination of these colors. We provide motorcycle, racing suspension set-up, tuning & services. I need a logo on motorcycle fork, so it should be more elongated. I attach photo for better understanding. I am available for other information.

    €88 (Avg Bid)
    Garanti Meilleur concours
    €88
    216 propositions

    Currently we are using Sucuri Firewall (caching) and WP Rocket as plugin. But we still can and need faster loading speed. Who can help us fine tuning our website?

    €106 (Avg Bid)
    €106 Offre moyenne
    49 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €221 (Avg Bid)
    €221 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €220 (Avg Bid)
    €220 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €500 (Avg Bid)
    €500 Offre moyenne
    1 offres

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    €488 (Avg Bid)
    €488 Offre moyenne
    1 offres
    Cakephp Expert 1 jour left

    ...solution designs and related code. ● Package and support deployment of releases. ● Work with teammates in the integration of applications including developing, refining, and tuning integrations between applications. ● Analyze and resolving technical and application problems. ● Adhere to high-quality development principles while delivering solutions on-time

    €11 / hr (Avg Bid)
    €11 / hr Offre moyenne
    16 offres

    ...recommendations based upon assessment of environment 3. Design of new environment Task #2 Description: - Install Process Buildout of new virtual machines 1. OS install and tuning 2. Install of Prerequisites. 3. Install of IBM Websphere 1. Migration of Ques to new environment 2. Testing of new environment Task #4 Description: 1. Provide Go

    €1848 (Avg Bid)
    €1848 Offre moyenne
    1 offres
    Web Development 21 heures left

    ...is an example of website which I am seeking to develop. The website will feature following options:- (1) Request for Spare parts/Accessories (2) Request for Garage /Auto Tuning (3) Request for Auto Detailing (4) Request for Car Wash Another example of reviews will be [se connecter pour voir l'URL] Concept should be same as both above website but design should

    €6 / hr (Avg Bid)
    €6 / hr Offre moyenne
    36 offres