絞り込む

私の最近の検索
次の条件で絞り込む:
予算
to
to
to
種類
スキル
言語
    ジョブステータス
    2,000 syn flooding attack ns2 仕事が見つかりました。次の価格: USD

    I'm in need of a skilled developer to craft an AI-based firewall in a SaaS format. Features must include: - Real-time threat detection - Automated incident response - A user-friendly dashboard. The finished product will...skilled developer to craft an AI-based firewall in a SaaS format. Features must include: - Real-time threat detection - Automated incident response - A user-friendly dashboard. The finished product will need to be hosted on a direct server. For security, it must meet these criteria: - Basic security measures - Advanced threat detection and prevention - Customizable security rules - DDOS attack prevention. Applicants with a strong background in AI, SaaS development, and cloud computing are desired, particularly those with experience in high-securi...

    $324 (Avg Bid)
    $324 平均入札額
    12 入札

    ...(rennovate the home) and have good drainage - engineer design etc required for DA. The property was flooded 2 weeks ago in the heavy downpour (by overland flows from surrounding property). Design a new stormwater drainage system to prevent flooding. May involve liason with Councils Civil engineers.... Key Responsibilities: - Assessing the current state of the roof drainage system and providing recommendations to address the overland flow issues. - Designing and implementing an efficient stormwater drainage system that ensures the prevention of flooding in and around the property. Ideal Skills and Experience: - Proven experience in stormwater engineering and residential water management. - Strong understanding of existing roof drainage systems and their modification requi...

    $33 / hr (Avg Bid)
    $33 / hr 平均入札額
    13 入札

    I'm looking for an expert in openbsc, osmocombb, and openbts GSM to help me with a project that includes the following key aspects: - **GSM Man-in-the-Middle (MITM):** The project also involves GSM man-in-the-middle functionality. This includes capabilities such as intercepting and analyzing GSM communications, modifying GSM network traffic, and manipulating GSM network authentication. Ideal Skills and Experience: - Proven experience with openbsc, osmocombb, and openbts GSM. - In-depth knowledge of GSM network setups, including voice calls, SMS, and base station capabilities. - Proficiency in network monitoring and analysis tools. - Previous experience with GSM man-in-the-middle implementations. - Excellent problem-solving skills to address any performance requirements that may ari...

    $2296 (Avg Bid)
    $2296 平均入札額
    26 入札

    ...small residential area. Key Project Details: - The primary goal of this project is to prevent flooding and ensure optimal water flow in the designated area. - You'll be responsible for the invert calculation with slope, a crucial aspect of the drainage system's design. - The project area is small, less than 1 acre, making it manageable but requiring precision and expertise to guarantee the best possible results. Ideal Candidate: - Extensive experience in landscape engineering, specifically in the realm of drainage systems. - Proficiency in calculating inverts with slope for drainage systems in residential areas. - Proven track record of successful drainage projects with a focus on preventing flooding and ensuring proper water flow. Your expertise is crucial ...

    $82 (Avg Bid)
    $82 平均入札額
    7 入札

    Game Requirement Character : Male, full animation: Idle, run, attack, jump, die… Provide full UI and Game Asset Provide full sound and effect Number Map: 8 Number Boss: 8 Enemy for each map: 4-5 ( with full animation: idle, run, attack, die… ) Provide Game icon. Intergrate with Admob in game Intergrate shop IAP in game. Game can run on Mobile and PC also. Game resolution: Hozirontal 1920x1080

    $20 (Avg Bid)
    $20 平均入札額
    6 入札

    I'm looking for a highly skilled machine learning expert to develop a solution that leverages supervised learning techniques to detect different types of side channel attacks . The solution should ideally be capable of adapting to various datasets. Key Responsibilities: - Development of detection model using supervised learning. - The model should be designed to adapt and learn from different datasets. - collecting data from Hardware level Ideal Skills & Experience: - Expertise in Machine Learning is mandatory, specifically in supervised learning techniques. - A strong understanding of cybersecurity and side channel attacks is required. - Familiarity with various datasets and hands-on experience in working with them. - A strong understanding of Microarchitecture analysis (reg...

    $467 (Avg Bid)
    $467 平均入札額
    31 入札

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $29 (Avg Bid)
    $29 平均入札額
    8 入札

    ...the time the systems administrators discovered the nature of the attack, it was largely too late. Critical files all across the AvantPharm network had been encrypted and were unusable. To make things worse, the backup system in place was unmonitored and had been failing backup jobs for months, so they did not have a reliable way to restore the encrypted data. AvantPharm narrowly averted complete disaster by paying the attackers one of the largest ransomware payments in history; 25 million dollars. However, they nearly lost the business when the attacker took 2 full weeks to return control of their data as well, so the impact was further damaging to profitability and reputation. In the end, the company barely weathered the attack and resumed operations at reduced capacity o...

    $19 (Avg Bid)
    $19 平均入札額
    95 入札

    I require a reliable and experienced developer to assist me in implementing a Content Security Policy (CSP) in my JavaScript application. Key Details: - Purpose: The primary goal of this CSP implementation is to prevent Cross-Site Scripting Attacks within the application. - Target Sources: The CSP should be configured to allow only self-hosted scripts...permitted. - Integrate the CSP seamlessly with the existing application architecture, ensuring no disruptions in functionality. Ideal Skills and Experience: - Proficiency in JavaScript and web application security. - Prior experience with Content Security Policy implementations. - Understanding of and its usage in specifying content sources. - Knowledge of common Cross-Site Scripting (XSS) attack vectors and mitigation strategies.

    $12 (Avg Bid)
    $12 平均入札額
    13 入札

    I recently moved into a new home a couple years ago and I'm...patio. Specifically, the problem is as follows: - Main Source: Rainwater - Severity: Moderate standing water after rainfall - Size: Small yard/patio area. small concrete slab in front of front door I'm looking for someone who can help me come up with a long-term solution to this problem. I need a system that can efficiently redirect the rainwater from the patios, preventing any further flooding or standing water issues. The ideal candidate should have: - Experience in landscape architecture or related field - Knowledge of water drainage systems - Ability to work on small-scale projects - Some understanding of residential property layouts If you believe you have the skills to handle this task, ...

    $5750 (Avg Bid)
    地方
    $5750 平均入札額
    4 入札

    ...vulnerabilities, severity levels, and recommended remediation measures. Collaborate with our development team to prioritize and address security issues. Requirements: Proven experience in penetration testing for Magento 2 websites and AWS environments. Proficiency in industry-standard tools and techniques for vulnerability assessment. Strong understanding of web application security principles and common attack vectors. Excellent communication skills. Deliverables: Detailed penetration testing report. Regular progress updates and communication. How to Apply: Please submit your proposal with details of your experience, approach to penetration testing, and proposed timeline and cost estimates. Additionally, include any relevant certifications or references. Thank you for your i...

    $178 (Avg Bid)
    $178 平均入札額
    21 入札

    We recently experienced a malware attack on our system and we're seeking an expert who can ensure this doesn't happen again in the future. We don't require data recovery services; our main priority is to make sure it never happens again. Ideal candidates should possess: - In-depth experience in counteracting malware attacks - Mastery in various security domains such as network, application, and endpoint security - Proven track record in enhancing system security

    $128 (Avg Bid)
    $128 平均入札額
    20 入札

    EL bot debe poder operar en varios DEX usando flashloans como caracteristica pricipal, las oportunidades de las transacciones las debe buscar en los mempool de los contratos inteligentes de cada DEX. Tambien debe poder hacer frontrunning de las transsacciones The bot must can operate on many DEX using flashloans like principal function, the oportunities of transaction have to l...caracteristica pricipal, las oportunidades de las transacciones las debe buscar en los mempool de los contratos inteligentes de cada DEX. Tambien debe poder hacer frontrunning de las transsacciones The bot must can operate on many DEX using flashloans like principal function, the oportunities of transaction have to look for in the mempool of the Contratcs of the DEX. must can do frontrunning,and sandwich ...

    $149 (Avg Bid)
    $149 平均入札額
    22 入札

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $11 (Avg Bid)
    $11 平均入札額
    7 入札

    I'm seeking a skilled professional to develop an efficient water management plan focusing on controlling water runoff for a commercial property. This project involves: - Creating a sophisticated plan to manage water run-off which optimises usage and minimises wastage. - Implementing strategies for efficient distribution to maximise productivity and minimise the potential for flooding or excess runoff. Ideal skills and experience for this role: - Understand the dynamics of water distribution and run-off - Proven experience in water management, particularly concerning commercial properties. - Familiarity with best practices in water run-off planning - Quality control expertise would be beneficial. Please note, this project is not just about creating a plan - it&#...

    $1075 (Avg Bid)
    $1075 平均入札額
    12 入札

    I'm seeking the expertise of a data scientist or machine learning engineer to develop a model for classifying various types of attacks on a KDD dataset. The ideal candidate will have extensive knowledge in the use of autoencoders for feature extraction and GRU models. Key project elements include: * Professionals will need to implement an autoencoder for feature extraction with the core goal of reducing data dimensionality. Prior experience in working with high-dimensional data and in deploying autoencoders is necessary. * Subsequently, the system built should be capable of classifying Denial of Service (DoS), User to Root (U2R), and Probe attacks within the KDD dataset. Good working knowledge of GRU models and the mentioned attacks is required. * The project includes steps to ensure...

    $34 (Avg Bid)
    $34 平均入札額
    8 入札

    I am looking for an experienced professional who can help me with an evaluation, material calculations and parts specification to present to the International Code Council. The product is composed of building materials and must be able to resist hurricanes, tornadoes, earthquakes, flooding, and wildfires for a safe and secure structure. There are more than 20 parts needed for this product, so I need an experienced professional with excellent attention to detail to get this product ready for presentation. If you have any questions or want to discuss the project more in-depth, please do not hesitate to reach out. Thank you!

    $1500 - $3000
    シール NDA
    $1500 - $3000
    8 入札

    Our main domain is also used as the DNS domain for ns1/ns2. Currently, we are experiencing difficulties accessing our website due to alleged DNS issues according to the PLESK system. The configuration should be adjusted so that the domain correctly points to the right directory despite using DNS ns1/ns2, without causing other domains that utilize these ns1/ns2 of the main domain to cease functioning. Please note that we only accept genuine offers. Post-negotiations or negotiations within the chat conversation are not desired.

    $66 (Avg Bid)
    $66 平均入札額
    12 入札

    ...are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and resources. 2- prepare full package with the needed libraries and codes that is requested above. 3- for quantum computer you should connect with ibm quantum computer. 4- all requirement should be delivered in three days. ...

    $293 (Avg Bid)
    $293 平均入札額
    27 入札

    I'm looking for a skilled professional to conduct a network security test on our workstations using ARP poisoning techniques. The focus of this project is to identify vulnerabilities in the network and provide a detailed description of each one. Key Requirements: - Conducting ARP poisoning attack on our network - Identifying and exploiting vulnerabilities on workstations - Compiling a detailed report on the vulnerabilities found Ideal Skills and Experience: - In-depth knowledge of networking protocols and security - Previous experience with ARP poisoning attacks - Ability to produce detailed and comprehensive security reports - Familiarity with common network vulnerabilities and their exploitation This is a critical project for us, and we are looking for someone with signifi...

    $64 (Avg Bid)
    $64 平均入札額
    15 入札

    I'm looking to modify the SAAS-BOILERPLATE open-source project to create an interactive membership website for indie filmmakers and film students. NOTE: MOST of the required functions are already implemented in the boilerplate. You do NOT need to connect Stri...for webdesigner collaboration (squarespace has an interesting version that is attached below to the project) IDEAL FREELANCER PROFILE: - Have previous experience with backend development using Laravel PHP - security-focused emphasis on security against attacks on webapps - experience minimizing the attack surface of webapps - Understand how to integrate video hosting in SaaS

    $553 (Avg Bid)
    特集
    $553 平均入札額
    64 入札

    I am seeking a skilled freelancer to help me create a data collection tool for an intrusion detection system. This system's main purpose is to collect data for analysis, focusing on network traffic. Key tasks include: - Designing a new normal and attack dataset using Mininet WiFi - The focus is on detecting Denial of Service (DoS) and Man-in-the-Middle (MitM) attacks Ideal candidates should have experience: - Building intrusion detection systems - Working with Mininet WiFi - Handling network traffic data - Familiarity with DoS and MitM attacks This tool will greatly aid in identifying and preventing future network attacks by providing structured data for our analysis team.

    $350 (Avg Bid)
    $350 平均入札額
    3 入札

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    $208 (Avg Bid)
    $208 平均入札額
    12 入札

    I am seeking an expert in urban flood engineering focused specifically on asses...Key Responsibilities: - Inspecting and evaluating the existing flood infrastructure. - Assessing the current situation and providing an expert risk analysis. - Identifying vulnerable zones prone to flooding in residential areas. An ideal candidate would have: - Proficient skills in urban flood risk assessment. - A thorough understanding of urban flood mitigation strategies. - Experience in residential flood risk assessment. - Dedication to providing precise and accurate reports. I look forward to working with a professional who can help reduce our local community's vulnerability to urban flooding. This could be a crucial first step in improving our neighborhood's resilience against ...

    $620 (Avg Bid)
    $620 平均入札額
    30 入札

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $17 (Avg Bid)
    $17 平均入札額
    5 入札

    Wordpress site not opening need to fix now may be attack?

    $5 / hr (Avg Bid)
    $5 / hr 平均入札額
    81 入札

    I'm on the lookout for a season...expertise in computer security. Key Project Objectives: - Assessment and improvement of network security - Implementation of secure protocols, with a specific focus on http3 - Thorough analysis and counteracting of cyber security threats - Network traffic analysis under attack conditions Ideal Skills and Experience: - Profound knowledge in network security and cyber security - An adept understanding and experience in http3 - Proven experience in security threat mitigation - Prior experience handling network traffic analysis under attack conditions Please note that only candidates with expert-level experience in the above-mentioned fields will be considered. This project demands the highest level of proficiency and professional acumen...

    $28 / hr (Avg Bid)
    $28 / hr 平均入札額
    21 入札

    I am in need of a skilled cybersecurity professional with specific experience in DDoS threats. The purpose of this project is to capture and analyze DDoS attack traffic from our corporate network. With your help, I aim to: - Identify patterns that indicate a potential DDoS threat - Understand our network's vulnerabilities to these specific attacks - Develop a proactive defense system through learned network behavior Please note, this project requires experience with corporate network environments, analysis of DDoS network traffic, and a deep understanding of network defense systems.

    $224 (Avg Bid)
    $224 平均入札額
    11 入札

    ...sending services. The project requires creation of a system that sends an email when specific conditions are met. Specifically, the system should be designed to trigger an email alert based on MQTT sensor data. This email should be sent when: - The content of the message matches a preset condition - The topic of the message aligns with a predefined topic Avoid Duplicity of message and avoid flooding when criteria matches Ideal Skills: - Strong experience in working with MQTT protocol, particularly sensor data - Proficiency in Node-Red and MySQL database - Experience in integrating email sending services When applying, kindly showcase your experience related to MQTT, Node-Red and MySQL database. Examples of past projects where similar skills were applied will be highly app...

    $155 (Avg Bid)
    $155 平均入札額
    20 入札

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $66 (Avg Bid)
    $66 平均入札額
    8 入札

    I am looking for a professional capable of designing structural elements - specifically crawl space foundations - for single-family homes in Rifle, CO. I will supply CAD files to facilitate your workload, ideally speeding up the project process. Key Responsibilities: - Create foundation design and drawings for single-family homes ...standards Ideal Skills & Experience: - Proven experience in structural engineering - Knowledge of single-family home construction and specifically crawl space foundation styles - Familiarity with local codes and standards in Rifle, CO - Proficient in using CAD files - Professional Engineering (PE) license to Stamp designs for construction Please note: Special site conditions such as steep slope, flooding risk, or dense vegetation do not apply in...

    $1928 (Avg Bid)
    $1928 平均入札額
    7 入札

    I'm urgently in search of a certified and empanelled vendor who can perform a comprehensive scan for both my web and mobile applications. Key Tasks: - Conduct thorough scans to identify any potential vulnerabilities. - Draw up a comprehensive report detailing any findings. Ideal Candidate: - Comprehensive knowledge of different attack vectors is mandatory, even though no specific concern is prioritized for this project. - Proven experience as an empanelled vendor is compulsory. - Must be able to work under tight deadlines, as the completion of this project is ASAP.

    $340 (Avg Bid)
    $340 平均入札額
    11 入札

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $66 (Avg Bid)
    $66 平均入札額
    7 入札

    Project Overview: Vigilumw...to exceed the challenges of tomorrow. Our mission themes focus on the following areas: • Personal health safety and wellbeing – from monitoring human body performance to increasing sensory perception. We design wearable products that improve the health, safety and wellbeing of people when their natural senses or abilities can no longer be relied upon. • Sustainable communities – from severe flooding and seismic events to uncontrollable infrastructure and wildfires. We design wearable products that reduce the existential impact of crises and disasters on people and communities. The thermal glass project is one of two projects we are pursuing in 2024. The other relates to active and passive illuminated clothing, to improve visibil...

    $612 (Avg Bid)
    $612 平均入札額
    15 入札

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $82 (Avg Bid)
    $82 平均入札額
    14 入札

    Per country analysis of Distributed Denial of Service attacks We have been collecting data on UDP reflection based Distributed Denial of Service attacks since 2014. There are significant differences in attack patterns between countries (time of day, day of week, target of attack) and in response to global interventions targeting DDoS. This project would involve drilling down in to the per-country data to understand what is going on and why.

    $137 (Avg Bid)
    $137 平均入札額
    28 入札

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $37 (Avg Bid)
    $37 平均入札額
    11 入札

    As an organization deeply involved in risk management, we're currently on the lookout for a remote sensing specialist with specific proficiency in Synthetic Aperture Radar (SAR). Key Responsibilities: - Utilize your expertise in SAR to assess the risk associated with flooding. - Generate detailed reports based on SAR data to guide our mitigation strategies. Skills and Experiences: - Comprehensive knowledge and experience in SAR technology. - Strong background in the analysis of flood risks and hazard assessment. - Experience in utilizing remote sensing technologies for natural hazard assessment. - Familiarity with remote sensing software and SAR data interpretation. We look forward to your bid if you have the necessary qualifications and would like to make a significant imp...

    $163 (Avg Bid)
    $163 平均入札額
    4 入札

    I have a small website running on Zencart that apparently suffered a DDoS attack 3 days ago and the website is still down. Now my clients can't visit the site, I've contacted Hostgator (I have a shared server account there) and I've been told I have "web bots crawling my site at unmanaged speeds"... I tried to set longer crawl delays and installed the CloudFlare but the website is still down... Any ideas how to bring the website up and running again?

    $23 (Avg Bid)
    $23 平均入札額
    15 入札

    I'm seeking a seasoned Java developer for an immediate project involving the construction of a Spring Boot filter. The main task centres on the creation and implementation of a filter for all incoming requests to the controller, specifically designed to combat XSS attacks and remove Zero Width Space (ZWSP) characters. Key Project Requirements: - Develop a Spring Boot application filter. - The filter must effectively handle and block all potentials XSS attacks. - The filter must efficiently remove all encountered ZWSP characters. - The developed filter must suitably plug into a Spring Boot application. - The filter should be designed to handle high networking traffic smoothly. Test Cases Require to Cover: - Scenarios of filtering XSS attacks. - Scenarios that deal with the removal o...

    $139 (Avg Bid)
    $139 平均入札額
    7 入札

    I require a comprehensive analysis of various attack surface management companies. The major areas to focus on include: 1. Features: This includes an exhaustive evaluation of the following: - Vulnerability scanning - Asset discovery - Risk assessment - Configuration management 2. Pricing: Provide a detailed overview of each company's pricing structure along with proof. 3. Effectiveness: I'm interested in a thorough evaluation of the effectiveness of each company's software/services. The ideal freelancer for this job should possess an in-depth understanding of cybersecurity software and services. Experience in writing reviews and comparisons of software is a bonus. The review is to be delivered in a concise, easy-to-comprehend report. Please include C...

    $108 (Avg Bid)
    $108 平均入札額
    25 入札

    We require an individual capable of crafting a comprehensive proposal encompassing our array of vulnerability assessment and penetration testing services, including: 1) Vulnerability Assessment and Penetration Testing for Web Applications, Mobile Applications, N...comprehensive proposal encompassing our array of vulnerability assessment and penetration testing services, including: 1) Vulnerability Assessment and Penetration Testing for Web Applications, Mobile Applications, Networks, Infrastructures, and Active Directories. 2) Social Engineering Assessments. 3) Physical Security Evaluations. 4) Red Teaming Exercises. 5) Purple Teaming Collaborations. 6) Attack Surface Management. 7) Source Code Analysis. 8) Software Composition Analysis (SCA). 9) Dynamic Application Security Testi...

    $23 / hr (Avg Bid)
    $23 / hr 平均入札額
    22 入札

    ...and Refine.) • Identify and Fill Gaps: Look for content gaps within my niche. Providing information that is currently unavailable, underexplored or make a very difficult and scientific explanation, to a much-understood language. • Share my Unique Perspective: Incorporate personal insights and experiences. This can offer a fresh angle on common topics. • Always think on a new angle / approach to attack the keywords subject, by using use data, graphs, synthesis data and key takeaways, focus on Quality. • Engage with my Audience; Make a Recognizable Impact, Ensure my content makes a noticeable difference in my audience's knowledge or experience. • Cite my Sources Properly: When using information, facts, quotes, or ideas from others, citing my sources n...

    $895 (Avg Bid)
    $895 平均入札額
    12 入札

    I want to get a topic in Ransomware and write on Ransomware attack effects on IT Businesses.

    $117 (Avg Bid)
    $117 平均入札額
    53 入札

    ...and Refine.) • Identify and Fill Gaps: Look for content gaps within my niche. Providing information that is currently unavailable, underexplored or make a very difficult and scientific explanation, to a much-understood language. • Share my Unique Perspective: Incorporate personal insights and experiences. This can offer a fresh angle on common topics. • Always think on a new angle / approach to attack the keywords subject, by using use data, graphs, synthesis data and key takeaways, focus on Quality. • Engage with my Audience; Make a Recognizable Impact, Ensure my content makes a noticeable difference in my audience's knowledge or experience. • Cite my Sources Properly: When using information, facts, quotes, or ideas from others, citing my sources n...

    $2465 (Avg Bid)
    $2465 平均入札額
    26 入札

    Seeking skilled freelancers for UI/UX design for an Attack Surface Management project. Familiarity with Attack Surface Management preferred but not mandatory. Design style similar to & Please share relevant work samples. Specifics: - Incorporate interactive dashboards - Include detailed analytics - Construct a user-friendly navigation system Skills and experience: - Strong UI/UX design skills - Previous work with similar projects - Knowledge in cybersecurity (preferred, not mandatory)

    $1003 (Avg Bid)
    $1003 平均入札額
    58 入札

    I need a professional with expertise in evaluating the stability and integrity of flood-affected historical sites. Your task is to: - Identify potential hazards associated with flood-related damage - Evaluate the structural integrity of the historical buildings post-flooding - Develop a first-response plan in case of further damage for the building and the antique. Your evaluation is crucial in providing a clear understanding of the risks associated with the site, including the stability of the structure, potential falling hazards, or other related risks. Ideal skills for this project: - Experience in risk assessments, particularly for historical sites - Expertise in understanding flood-related damage to structures - Background in developing safety and first-response plans -ex...

    $90 (Avg Bid)
    $90 平均入札額
    27 入札

    Looking for an experienced graphic artist with mastered skills in Microsoft Word to help me design an informative and eye-catching pamphlet about acute myocardial infarction or heart attack. Detailed Brief: - The pamphlet size: Must be designed to fit on both sides of A4 paper, including diagrams. - Color Scheme: Green and Yellow. I want these colors to be the dominant shades for the design, giving clean and professional vibes. Maximum size: two sides of an A4 page (margins 2cm), Font styles Arial or Calibri with minimum font size 11, line spacing 1.5 (minimum). - Content: It will cover three main points: 1. Symptoms of acute myocardial infarction. 2. Causes of acute myocardial infarction. 3. Prevention tips for acute myocardial infarction Ideal Skills: - Strong Microsoft ...

    $100 (Avg Bid)
    緊急 保証
    $100
    96 エントリー