An experienced technician to install a door security system for a business. Must be done by End of day Tuesday. We have the equipment and are familiar with the system and can help with questions you may have. Some of the wiring has already been started. This is for 8 doors, 2 exterior and 6 interior. The 2 exterior doors already have the magnets mounted
HI, Technical articles for security cameras, systems 500 words per article
I need someone who has strong knowledge in network security protocols mainly relating to 2FA and GSM/3GPP AKA. Main goal is to write out the protocols and to provide justifications (whether it can resist any form of attack etc.) according to 2 questions.
I need a report written on how cyber security effects law firms and why they need it, also highlight the threat that exist and how they can impact each department, by the end of it create a framework using Uml to structure the threats and potential outcomes along with solutions. report needs to be 8k words and needs to be completed by 29th August.
We need an web application written in any language that communicates data through http authentication and rest format How it works is businesses inputs data on our application and it sends data to another system. Experience with api and we applications apply only. Include your prior work with bid proposal please. Thanks
...in real-time from an existing Drupal 8 website (URL will be provided upon contract award) that is in chinese. We will provide an API/RESTful services to accomplish this. You will be responsible for pinging the RESTful web services and pulling content. You will be required to set up a B2B account on WeChat, in our name, following all necessary application
VNC Server - I need someone with HIGH VNC Security Experience. For more details , we talk in private. Please do not waiste your time if you haven`t got enough experience with VNC server. I accept only High Experience DEV`s. (I prefer the ones working for themselves not for companies) . I agree to pay for quality! Only serious people! Thanks.
...application vulnerabilities and other content testing and [login to view URL] are better of a black hat 2. Use the Business Security Assessment Tool to exploit vulnerabilities within the scope of the assessment target and verify vulnerabilities such as Web application vulnerabilities, host operating system vulnerabilities, database vulnerabilities, weak passwords
...setup in a secure manner with regards to several security topics like authentication, authorization or encryption. This ensures that security is already built-in if done correct. Please analyze the CloudFormation template provided. Check against security best-practices and identify potential security issues and business impact if that stack would be
...PHP developer to work on the development and architecture of a custom web based software in the Logistics and Transportation industry. The right candidate will work closely with the lead Front End developer in the USA and will focus on server side architecture, security and API services. Demonstrated ability to work on complex software is a must.
I need a server that store APIs to serve unlimited requests. The server need provide same API response format. Please click the link as below for more details. [login to view URL]
I want to do the simplest ICO ever. I want to take an asset (say a painting of mine, or my house, or my car), and pledge it to a digital coin offering. Whoever owns this coin owns the asset (and all distributions from the asset - say the painting sells at auction for $1mm dollars - then all holders of coins would get a distribution of cash). So I need someone to: Launch the coin on an exchange. I ...
We are looking to hire a freelancer who can create an effective road map for a Security Guards Business from a scratch. New Business, need a proper road map to a goal and sales team