Filtre

Son aramalarım
Şuna göre filtrele:
Bütçe
ile
ile
ile
Tür
Beceri
Diller
    İş Durumu
    2,000 aes ctf writeup iş bulundu, ücretlendirmeleri EUR

    I'm looking for someone who has experience in AES encryption and is also familiar with ASP.Net MVC database connection string, I need a person who can encrypt my connection string and show me the right way to complete the function.

    €7 / hr (Avg Bid)
    €7 / hr Ortalama Teklif
    19 teklifler

    Writeup on the Judiciary and Recommendations.

    €13 (Avg Bid)
    €13 Ortalama Teklif
    1 teklifler
    Indian Judiciary Writeup 4 gün left
    ONAYLI

    I require someone with a legal background, preferably from India, to draft a 3-4 page document on the Indian judiciary system. The document should thoroughly research and address two key aspects: 1) Proposed changes to the selection process of the Indian judiciary- including the establishment of a Union Judicial Service Commission (UJSC) aligned with the UPSC to aid in the selection process of the Higher Judiciary and similarly creation of a State Judicial Service Commission for the selection of lower judiciary members who can advance within the hierarchy through promotion, among other recommendations. 2)Solutions for addressing the issue of long pending cases in India- This includes proposals to expedite the case registry process, such as involving a third party for swift document regist...

    €11 (Avg Bid)
    €11 Ortalama Teklif
    14 teklifler

    In need of a skilled resume writer who can adeptly highlight my experience in technology and telecommunications, particularly in softwa...development. With my director and managerial level career in mind, the final product should impress potential employers by demonstrating key managerial skills as well as technical expertise. Key Skills for the Resume Writer -Experience in writing resumes for IT managers -Understanding of software development -Experience writing for the telecommunications sector Strategic Highlights in Your Writeup -Experience in managing and leading tech teams -Proficiency in software development -Career progression proving managerial skills Looking for someone who can deliver a compelling case on a single page to help me secure a high-level position in the te...

    €77 (Avg Bid)
    €77 Ortalama Teklif
    40 teklifler

    ...WiFi router. It can maybe use a technology similar to Z Wave or Zigbee wireless technology, and maybe use a method like PairAsync for pairing or connecting. The app must have a high level of security using HTTP, SSL, TLS or similar, and must encrypt and decrypt all data during transit and at rest with advanced security features like LESC, and using systems such as, or similar to, FIPS 140-2 and AES-SHA256 cryptography. I would like to have copies of any written source code that is created by you or any details on the tech stack, SDK and APIs used. As the app could be using Bluetooth or BLE, I want users to be able to send and receive data without the requirement of having to prompt for, or give permission for, a “pairing” or “connecting” of devices each ti...

    €820 (Avg Bid)
    €820 Ortalama Teklif
    50 teklifler

    We have an app created for Android and Apple that has been designed and coded. We have the following writeup and outline to get a quote on additional functionality and features. If you need any additional information, please feel free to reply. We are looking for a US BASED company

    €4721 (Avg Bid)
    €4721 Ortalama Teklif
    121 teklifler

    Seeking a proficient science writer with in-depth knowledge of Machine Learning to be part of my project. Key Requirements: - Pen down articles about Machine Learning within Artificial Intelligence and Reinforcement Learning. - Must be skilled in writing technically sound and detailed contents. - Writings will target Academic professionals in AI, hence the content should be academic and professional level. Ideal Candidate: - Good understanding of Machine Learning, Artificial Intelligence, and Reinforcement Learning. - Command over technical academic writing. - Familiar with academic preferences and writing standards. ***Important: Once you finish your write-up, pass through plagiarism checker and share result.

    €91 (Avg Bid)
    €91 Ortalama Teklif
    45 teklifler

    ...lot of images and screenshots. It should be in-depth and should feel like the author has extensively worked on the software hands-on. Should use first person communication talking directly to reader using "you", "I", "us", "your". Process- Should present an outline with intro and all the headings/subheadings that you plan to cover. Should get this outline approved before starting with detailed writeup. Task 2 - Write a Linkedin post in less than 150 words. Topic - AI in design. The post can be visualized as a photo slide show or as a text paragraph with a photo. Our graphic designer will create the photo/slides as per your instruction. The goal is to generate curiosity and get people to interact and comment on the post. The ideal cand...

    €53 (Avg Bid)
    €53 Ortalama Teklif
    14 teklifler

    ...and Social Security Numbers. - File Saving: After the blurring process, I don't want to affect original data. Therefore, the solution must create a separate PDF that hosts the redacted information. - Encryption: For even further data protection, the blurred PDF file has to be encrypted using the AES (Advanced Encryption Standard) method, ensuring optimal security. To be considered for this task, you should have: - Proven experience with data redaction or similar projects - Robust knowledge of AES encryption - A strong background in software development, specifically for privacy and security applications. The ultimate goal is to generate a tool that is user-friendly and efficient, delivering maximum data protection. An ideal freelancer for this job is rigorous, fam...

    €32 (Avg Bid)
    €32 Ortalama Teklif
    13 teklifler

    Develop an app which resides and runs of a usb thumb drive. The app needs to launch automatically when the usb is inserted into the Windows computer. App should give a selection of Backup or Restore to the user...an OPTIONAL add on quote if encryption is required. More details on Encryption below: OPTIONAL QUOTE: Encryption has to be on the entire thumb drive level. As soon as thumb drive is inserted the first time, it has to ask user whether encryption is needed, if yes, it has to ask user to setup a strong key/password and encrypt the disk according to any standard FIPS approved encryption standards (AES preferred). Whenever the thumb drive is used subsequently, it has to prompt user to enter the password to unlock the drive and the app before continuing with backup/restor...

    €715 (Avg Bid)
    €715 Ortalama Teklif
    13 teklifler

    ...developing encryption, decryption, and key generation functionalities. Key Project Requirements: - Extensive knowledge and application of Cryptography - Proficiency in the C programming language - Experience in generating SHA keys The Cryptographer will perform the following tasks: 1. Encryption and Decryption: You will write code that facilitates both encryption and decryption processes using the AES (Advanced Encryption Standard) algorithm. 2. Key Generation: Involves the creation of a safe and secure key generation mechanism utilizing SHA. You should prioritize key security to guarantee the confidentiality and integrity of the encrypted contents. 3. File Support: The coded software should accept file inputs only, handling and processing encryption and decryption request...

    €16 (Avg Bid)
    €16 Ortalama Teklif
    3 teklifler

    As an expert in Google Cloud services and security configurations, you'll be tasked to: - Set up a Load Balancer on Google Cloud Engine for a Google App Engine project in a two-hour live session via Google Meet with screen...Set up a Load Balancer on Google Cloud Engine for a Google App Engine project in a two-hour live session via Google Meet with screen sharing. - The main goal is to increase the security of the site. - You're expected to disable TLS 1.0 and 1.1 protocols, and enable both TLS 1.2 and TLS 1.3 versions in the project for optimal security. - Also, certain encryption algorithms, specifically RSA, AES 128, AES 256, CBC and GCM need to be disabled. The ideal candidate must have extensive experience with GCE and advanced understanding of TLS protocols...

    €49 (Avg Bid)
    €49 Ortalama Teklif
    4 teklifler

    I need a custom code component created for my PowerApps Canvas App. Key Requirements: - The component should decrypt static text encrypted with AES or any other simple algorithm Deadline: - I need this project completed ASAP. Ideal Skills and Experience for the Job: - Strong experience with C# programming, Java script or any language that we will use to achieve the goal - Prior experience with creating code components for PowerApps Canvas Apps. - Proficiency in encryption/decryption methods

    €152 (Avg Bid)
    €152 Ortalama Teklif
    39 teklifler

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support...my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be det...

    €328 (Avg Bid)
    €328 Ortalama Teklif
    13 teklifler

    This project aims at creating a valuable white paper that provides an in-depth understanding of Contingent Payment Debt Instrument (CPDI) and Off Balance Sheet project financing for carbon offset project installations and initiatives. As a business that values sustainable practices, this writeup will be instrumental in exploring the effects of Off Balance Sheet Financing and CPDI's impact on a company's finances through the use of these "No upfront cost" carbon offset projects. Key Objectives: - Detailing Off Balance Sheet effect of carbon emission projects. - Carbon offset monetization and CPDI to pay for these carbon emission projects. - Evaluating Off Balance Sheet application in project financing - Evaluating Carbon Offset Monetization and CPDI's a...

    €129 (Avg Bid)
    €129 Ortalama Teklif
    38 teklifler

    Some good information about mustang and a good writeup The Mustang is an iconic American sports car produced by Ford Motor Company. Introduced in 1964, it quickly became a symbol of American muscle and style. Over the years, it has evolved through various generations, each offering unique design elements and performance enhancements. The Mustang's design is characterized by its long hood, short deck proportions, and distinctive front grille. It has been available in coupe, convertible, and fastback body styles, appealing to a wide range of enthusiasts. Performance-wise, the Mustang has been offered with a variety of engine options, from economical inline-four cylinders to powerful V8s, catering to different driving preferences and performance needs. It's known for its i...

    €12 / hr (Avg Bid)
    €12 / hr Ortalama Teklif
    9 teklifler

    I'm seeking an expert who can decrypt an AES encrypted .cap file. The file contains encrypted data I need to access for educational purposes. Key requirements include: - Expertise in decrypting AES encrypted files - Ability to efficiently and securely recover the data from the .cap file - Strong commitment to data privacy and confidentiality Please provide examples of similar work you have done in the past, and outline your proposed approach to this task.

    €17 / hr (Avg Bid)
    €17 / hr Ortalama Teklif
    15 teklifler

    ..."X", you might append ".bwf" or another unique extension to the encrypted files. 5. Ensure that your decryption process accurately recovers the original file, including its correct extension. The decrypted file should be identical to the original input file in every aspect. Topics for Approach 1: Implementation of one of the below algorithms Implementation of DES (Data Encryption Standard) AES (Advanced Encryption Standard) Camellia Blowfish Twofish RC4 (Rivest Cipher 4) Serpent CAST-128/CAST-256 Project Guidelines: 1. Proposal Submission: o ● Submit a proposal outlining the chosen approach and topic. o ● Include a brief description of the methodology for Approach 1 or the selected 2. Research Phase: o ● Approach 1: Conduct research on t...

    €108 (Avg Bid)
    €108 Ortalama Teklif
    43 teklifler

    I am currently seeking an experienced AES cyber security professional. Project Summary: - Implementation of Encryption Algorithm: a) Develop an implementation scenario for one encryption algorithm. b) Provide a detailed description of the chosen algorithm, including its functioning. c) Apply software engineering approaches, starting from requirements gathering to design and implementation phases. d) Submit a complete project package containing: • The implemented encryption algorithm. • Detailed documentation of the algorithm and project development process. • A graphical interface for file encryption and decryption. • Important Implementation Tips: In your implementation, please adhere to the following guidelines: 1. Your program should accept any file type as ...

    €122 (Avg Bid)
    €122 Ortalama Teklif
    49 teklifler

    I'm seeking an expert in Python to develop a decryption utility tool. The purpose of this tool is to decode encrypted messages, binary files, and encoded data, helping me simplify and expedite data analysis tasks. The ideal candidate will: • Have substantial experience with Python programming. • Be familiar with various encryption algorithms, notably AES, RSA and DES. Your expertise in these will be key to the successful creation of this utility. • Be committed and focused, as the tool must be completed ASAP. Looking forward to receiving bids from suitable and interested freelancers. Please, when bidding, include any relevant experience and examples of similar projects.

    €19 (Avg Bid)
    €19 Ortalama Teklif
    76 teklifler

    ...users on HIPAA regulations and compliance requirements and ensure ongoing compliance through regular audits and monitoring. Technologies: - Frontend: HTML5, CSS3, JavaScript (React.js for web, React Native for mobile) - Backend: Node.js, , MongoDB (or other suitable database) - Authentication: JWT (JSON Web Tokens) with secure storage and handling of authentication tokens - Encryption: AES encryption for data at rest and TLS encryption for data in transit - Audit Trails: Implement logging mechanisms to capture user activities and system events for audit purposes - Compliance Tools: Utilize HIPAA compliance management tools for risk assessment, policy management, and compliance monitoring Deliverables: - Fully functional web-based LMS accessible via web browsers and a mobile app...

    €14263 (Avg Bid)
    Acil
    €14263 Ortalama Teklif
    143 teklifler

    I'm in need of a quick and skilled Wikipedia page creator who can accurately reflect an individual's key details based on a content writeup and few verified third-party sources I provide. The purpose of this project is to establish accurate and reliable information about the individual online. To accomplish this: - You should have a proven track record of creating successful Wikipedia pages or accounts. - You should be able to effectively navigate and adhere to Wikipedia's strict editing and posting guidelines. - Prior experience in crafting Wikipedia pages for individuals is highly preferred. - You need to present a portfolio of previous work, demonstrating your ability to effectively translate sources into engaging, encyclopedic entries. - You need to be available ...

    €138 (Avg Bid)
    €138 Ortalama Teklif
    33 teklifler

    I am looking for a professional developer who can design and build a productivity tool as a web app, IOS, and Android application. This productivity tool is targeted for task tracking, team collaboration, and document sharing. Needs: #1 - RFP Writeup with details for these provide sample RFP, BRD,TRD you did for similar projects. This is to create full documentation of needs not programming. Once we have requirements down based on your experience the project will go on to bidding. Key Features: - Integration with artificial intelligence and cloud platforms like Google and Azure. - Supports multi-factor authentication (MFA/2FA) and Active Directory integrations. - Seamless synchronization of the app across all devices for a real-time experience. - Integration with email and ca...

    €217 (Avg Bid)
    €217 Ortalama Teklif
    35 teklifler

    ...pace of development. Key requirements include: - Proficient in the use of NTAG 424 DNA for mutual authentication -' SUN, AES,CMAC, dynamic authentication, mutual authentication' How they work. - Proficient in making native app on NFCs. - Familiar with programming and product authentication methods - Comprehensive knowledge in front-end, backend and database so, in short, i want to make a cross-platform anti-counterfeiting app using NFC (ntag424 dna) . which the user is going to scan the tag with the app it's going to verify it with the database. then show them the UI as per you familiar with these kinds of platforms and the ntag 424 DNA (SUN, AES,CMAC)? i will welcome any suggestion or recommendation from your side too. Better ideas are also welcome...

    €409 (Avg Bid)
    €409 Ortalama Teklif
    5 teklifler

    I am in search of a freelancer with specialized skills in cybersecurity, specifically those who have the capability and experience required to tackle and solve a Capture The Flag (CTF) challenge in the area of penetration testing.

    €27 (Avg Bid)
    €27 Ortalama Teklif
    8 teklifler

    ...need an expert to implement advanced AES-256 bit security encryption for an SQLite database in a Windows application using VB.Net. This task requires specific expertise in working with encryption to secure private data. Key Requirements: - Proficiency in VB.Net - Deep understanding of AES-256 bit encryption - Familiarity with SQLite databases - Prior experience in data encryption The encrypted SQLite database will become a storage unit for personal identifiable information. This sensitive data demands high security measures, thus professional handling is crucial for the success of this project. The completed task should ensure maximum protection against unauthorized access and reliably shield the stored personal data. Main Task: - Implement advanced AES-256 bi...

    €55 (Avg Bid)
    €55 Ortalama Teklif
    2 teklifler

    I am in need of a compelling sales pitch for our IT services, specifically targeting large corporations. The sales pitch should prominently feature two of my main services: Active Directory Migrations, Consolidations, and On-prem migration to Azure AD. Key Benefits to Highlight: - Significant cost savings - Over 14 years of experience in providing top-tier IT services to some ...- Over 14 years of experience in providing top-tier IT services to some of America's largest companies Ideal Skills and Experience: - Significant knowledge in IT sector - Proven experience in sales pitch creation - Understanding of large business requirements - Familiarity with Azure AD and Active Directory. Previous Projects: Ascension Health domain Community Health Hospital Rockwest Bedrock AES P...

    €144 (Avg Bid)
    €144 Ortalama Teklif
    8 teklifler

    In this assignment, we will simulate a common scenario in competitive intelligence. You are working for Clouflare and a competitor just published a press release about a new product and you are tasked with creating a field response because you get a lot of questions about it. Here is the blog post from the competitor: not write more than a single page, double spaced. Your audience are Sales Representatives who are NON-TECHNICAL. In your field response: explain the "Who, What, When, Where, How", but don't spend too much time on it. In your response, ensure that you answer "Why would I (as a sales rep) care? What is the impact on Cloudflare?" (this will be the more important section). Please send your writeup before 3pm Pacific Time on Tuesday, March 12t...

    €87 (Avg Bid)
    Acil
    €87 Ortalama Teklif
    16 teklifler

    CREAR UNA BIBLIOTECA ENCRIPTACION AES PARA TARJETA MIFARE PLUS PARA ARDUINO ESP32

    €488 (Avg Bid)
    €488 Ortalama Teklif
    7 teklifler

    I am a beginner in Capture The Flag (CTF) problem-solving, seeking expert assistance. Here are the specifics: - Challenge Categories: I'm mainly interested in understanding and solving problems related to Cryptography, Web Exploitation, and Binary Exploitation. - Programming Languages: The languages I am currently proficient in are Python and C++. Hence, any guidance needs to be provided considering these languages. It is essential for the freelancer to have substantial experience in CTF problem-solving across the specified categories along with proficiency in both Python and C++. Please make use of simple and easy-to-grasp terminologies, given my beginner status. Looking forward to broadening my knowledge base in this fascinating realm. i will give you the problem ...

    €11 (Avg Bid)
    €11 Ortalama Teklif
    3 teklifler

    ...an interactive CTF (Capture The Flag) exercise for a desktop application. The primary target will be IoT devices, specifically smart home devices and wearable tech. Below are the fundamental expectations for this project: • The exercise should focus on diagnosing and exploiting encryption weaknesses, authentication flaws, and firmware vulnerabilities on IoT devices. • As a teaching tool, the CTF exercise should be simple and straightforward. While not compromising on comprehensiveness, it's important to ensure users can grasp the basics of IoT security via CTF challenges. Ideal candidates for this project should have: • Solid understanding of common security vulnerabilities in IoT devices, especially in smart home and wearable tech. • E...

    €1138 (Avg Bid)
    €1138 Ortalama Teklif
    6 teklifler

    ... Opcje Płatności i Fakturacja: Integracja z systemem Stripe do obsługi płatności i generowania faktur. System Ocen i Recenzji: Możliwość oceniania i recenzji wynajmowanych samochodów oraz wynajmujących. Bezpieczeństwo: Autentykacja i Autoryzacja: Wykorzystanie OAuth 2.0 i JWT do zarządzania dostępem. Szyfrowanie Danych: Zastosowanie TLS dla bezpiecznego przesyłania danych i AES dla ochrony danych przechowywanych. Backup i Odzyskiwanie Danych: Regularne tworzenie kopii zapasowych danych i zapewnienie mechanizmów ich odzyskiwania. Dodatkowe Uwagi: Moduł Zarządzania Ogłoszeniami: Rozbudowa backendu o funkcje zarządzania ogłoszeniami, w tym API do dodawania, edytowania, usuwania i przeglądania przez użytkowników. Integracj...

    €4013 (Avg Bid)
    Gizlilik Anlaşması
    €4013 Ortalama Teklif
    14 teklifler

    As an enthusiast in the field of ethical hackin...enthusiast in the field of ethical hacking, I'm in serious search of a capable and experienced hacker who can crack the code on both web-based, network-based, and binary-based Capture The Flag (CTF) challenges. What I Need: - An expert who can proactively tackle and unveil the hidden information concealed behind these challenges. The ideal candidate should have: - Profound knowledge and experience in Vulnerability Assessment - Solid skills in Penetration Testing - Extensive understanding of Web App Security. Don't forget, your application must include details of your previous work related to CTF hacking. If you've got the right skills and experience, don't hesitate to apply. Looking forward to se...

    €25 / hr (Avg Bid)
    €25 / hr Ortalama Teklif
    11 teklifler

    Need a cyber security specialist to decrypt an AES-CTR encryption for a CTF flag. provided information : pcapng file for wireshark and the encryption method written in python

    €22 (Avg Bid)
    €22 Ortalama Teklif
    6 teklifler

    ...The design of the client should be user-friendly, making it easy to traverse and understand. - High performance and stability: Despite its ease of use and setup, the client should not compromise on performance or stability. - The client interface needs the following features: "Connect", "Disconnect", and "Import Config" buttons. Clicking "Import Config" imports a configuration file encrypted with AES-256. The configuration file contains the server IP address, port number, virtual HUB name, username, and password. After importing the configuration file, VPN connections can be made by clicking connect and disconnect. Use direct TCP/IP connections, with an automatic reconnection interval of 15 seconds, always keeping the VPN online. The offici...

    €131 (Avg Bid)
    €131 Ortalama Teklif
    4 teklifler

    Hello, this is for doing the Amazon write-ups for the book you created - Piano /Keyboard for Intermediate As well as A+ content for the Intermediate Book. Here is the Amazon link for the Piano Beginners book we publish for reference. Thank you!

    €92 (Avg Bid)
    €92 Ortalama Teklif
    1 teklifler

    I'm currently seeking a skilled Python developer, specifically with expertise in Cyber security, to address a critical data encryption issue in our corporate network. The ideal candidate should be proficient in: - Cybersecurity measures and protocols - Data encryption - Python Programming The task at hand: - Implement AES-128 encryption using Galois-Field multiplication without any external libraries Experience in using Python for data encryption in a corporate setting is strongly preferred. The goal is to ensure the enhancement of the network's security and the integrity of our corporate data. Strong communication skills are a must, as the selected candidate might need to explain complex cybersecurity concepts to the in-house team.

    €24 (Avg Bid)
    €24 Ortalama Teklif
    6 teklifler

    ...PHP pages to develop not to mention two CSS HTML pages to parse for output. The chosen platform for this project is WYSIWYG Web Builder v19, and may utilize it's own controls and CSS imports with exception of a login page necessary to authenticate users and establish a timed session, resulting in cookie session management, utilizing AES for obfuscation. **Key Requirements:** - **E-commerce Functionality:** The site will utilize user authentication via PHP & AES, through; File IO. - **Payment Gateway Integration:** Implement Clover as the primary payment solution, ensuring secure and efficient transaction processing. - **User Experience:** Maximal visibility & archived changes, as well as seamless work flow, are preferable. - **Responsive Design:** The websit...

    €1494 (Avg Bid)
    €1494 Ortalama Teklif
    258 teklifler

    I'm on the lookout for a skilled freelancer who can implement AES encryption and decryption for text inputs efficiently. My project involves securing sensitive information through encryption and ensuring it can be decrypted back into its original format. Here's what I'm looking for: - **Strong Understanding of AES**: Proficiency in the Advanced Encryption Standard (AES) is a must. You should have a robust grasp of its workings, strengths, and how to implement it securely. - **Encryption/Decryption of Text**: The core task involves encrypting plain text and decrypting it back to its original state. Hence, experience with handling and manipulating text data is crucial. - **Security Best Practices**: Knowledge of security measures and best practices in e...

    €19 (Avg Bid)
    €19 Ortalama Teklif
    8 teklifler

    I need a cryptologist -programmer Library (algorithm): Argon2id, AES, RSA Programming language: Java, and your own choice for implementing the Rest API Sweeps work: The goal of this work is to create a software component that will store and securely exchange secret data, such as symmetric encryption keys, with other components. When developing this solution, the zero trust principle should be adopted, and the need to create secure copies of stored information should be taken into account. The correct functioning of the component must be demonstrated by testing Work plan: 1. principles of secure software development 2. authentication, authorization, cryptographic mechanisms 3. principles of implementing secure software 4. Security Testing The methodology will reset in the corresponde...

    €160 (Avg Bid)
    €160 Ortalama Teklif
    10 teklifler

    ...In parallel, our Content Management and Brand Managers teams are considering working with CRM Products and Content Groups in Promomats in the digital materials like AE and CLMs. This information is key from Commercial and Compliance point of view and must be integrated with Veeva CRM. This has to be tested in Sandbox before we move it to Business considers this information of the CLMs and AEs used and shown by the MSL and Sales Reps in the field very important. They want to capture this in the PowerBI report that is being built. Exercises: i Please, provide a technical proposal solution to solve this gap between systems. ii How can we setup this functionality? How can we ensure this information is integrated in the CRM and how we shown this in the CRM? iii Provide two ways to ...

    €234 (Avg Bid)
    €234 Ortalama Teklif
    8 teklifler

    ...In parallel, our Content Management and Brand Managers teams are considering working with CRM Products and Content Groups in Promomats in the digital materials like AE and CLMs. This information is key from Commercial and Compliance point of view and must be integrated with Veeva CRM. This has to be tested in Sandbox before we move it to Business considers this information of the CLMs and AEs used and shown by the MSL and Sales Reps in the field very important. They want to capture this in the PowerBI report that is being built. Exercises: i Please, provide a technical proposal solution to solve this gap between systems. ii How can we setup this functionality? How can we ensure this information is integrated in the CRM and how we shown this in the CRM? iii Provide two ways t...

    €186 (Avg Bid)
    €186 Ortalama Teklif
    9 teklifler

    ...requirements: - **Core Focus:** Integrate steganography into text, images, and video files using Java. - **Steganography Techniques:** - Implement Discrete Cosine Transform (DCT) - Integrate Discrete Wavelet Transform (DWT) - **Encryption:** - Use AES encryption algorithms - Ensure a low level of security for keys (sufficient for basic protection) The ideal freelancer will have: - Proficiency in Java programming (primary language) - Experience with cryptographic techniques - Understanding of DCT and DWT steganography methods - Knowledge of AES algorithms and key management The project is quite demanding; thus, it's pivotal that the freelancer demonstrates a strong portfolio which encompasses similar security-focused tasks. Above all else, creativity an...

    €25 (Avg Bid)
    €25 Ortalama Teklif
    3 teklifler

    I need a skilled developer to create a steganography application tailored to my specifications. My key requirements include: - Development for a Windows environment. - Capability to embed text within images. - Use of AES for intermediate encryption level. Ideal skills for this project: - Proficient in cryptography and encryption algorithms. - Experienced with image processing. - Strong background in Windows application development. - Familiar with steganography techniques. Experience with the following is a plus: - Knowledge of AES encryption standards. - Past projects involving steganographic practices. I'm looking for someone who can deliver a secure, user-friendly application with a focus on confidentiality. Your expertise will help ensure that the text remains hi...

    €104 (Avg Bid)
    €104 Ortalama Teklif
    4 teklifler

    ...protection, secure transactions, and protection of sensitive information. Core project deliverables entail: • Ensuring SSL (Secure Sockets Layer) and AES (Advanced Encryption Standard) encryption methods are applied across the platform. • Implementing robust safeguards to protect customer data, secure online transactions, and preserve sensitive information, including banking details, ownership data, and server information. • Integrating various payment gateways into the platform, including PayPal, Stripe, and a direct bank API gateway. Prior experience in designing encrypted ecommerce websites is crucial, alongside proficiency in SSL, AES, and various payment gateway integrations. The ideal candidate should demonstrate a clear understanding of advanced enc...

    €707 (Avg Bid)
    €707 Ortalama Teklif
    151 teklifler

    I'm seeking a skilled Java Swing develope...connection must contain the following details: DataBaseName, Host, Port, User, and Password. - Database Compatibility: You should ensure compatibility with MySQL, Oracle, and PostgreSQL databases as the specific database type may vary. - Encryption: All passwords must be encrypted using AES encryption for security purposes. - Display: Upon launch, these connections should be displayed in a Swing JList. - Skills and Experience: The ideal candidate definitely needs substantial experience with Java Swing, AES encryption, and managing database connections. Your demonstration of past work will be an added advantage. Please remember to highlight in your application, your experience in the key areas detailed above. I look forward ...

    €160 (Avg Bid)
    €160 Ortalama Teklif
    6 teklifler

    I'm seeking a highly skilled Verilog engineer to design and implement an AES encryption and decryption system. This project has been initiated with the purpose of ensuring data security and as such, the successful applicant must be experienced in the field of cryptography. Proficiency in Verilog and a clear knowledge of encryption methods, particularly AES, are crucial for the success of this project. In your application, kindly provide: - Details of your past experiences related to Verilog - Any relevant project proposals you've worked on, showcasing your proficiency in developing AES systems. The deadline for completion of the project will be within one month. Please keep this timeframe in mind as you consider your application and potential schedule. I...

    €361 (Avg Bid)
    €361 Ortalama Teklif
    8 teklifler

    Queremos un diseño original que hable de nuestra música. Directo, impactante, llamativo. Nada corporativo. Que pueda ser enmarcado en un circulo y que aparezca una o dos aes ("A") y una exclamación. Sería ideal que fuese tipo sello lacrado o metálico como con el que marcan a las reses. En caso de incluir el nombre completo nos gustaría que fuera una tipografía que se modifique para ser única y original, nos gusta queso esta denote: clásico (cine 70's, Western) con clase (whisky caro) y rockandroll.

    €76 (Avg Bid)
    €76 Ortalama Teklif
    74 teklifler