|Articles on Information Security
||...need unique and high quality articles on the topics of information security, IT governance, risk, and compliance...compliance. The articles need to be written for the humans, not search engines. The audience are IT professionals...If the work is good, I will offer you long term projects.
||Mar 12, 2015
||Mar 12, 2015Ended
|Information Security Articles
||...unique advance technical Information Security Articles (300-500). The articles must not come for PLR Database...must be unique. The articles must be written in English. I will not pay for Articles that are not well...well written. Consider this as an intro projects. More articles will be required in the future.
||Web Security, SEO, Technical Writing
||Sep 16, 2009
||Sep 16, 2009Ended
|IT security projects
||...involved auditors from USA, Hon-Kong and Moscow. The projects are successfully completed).
- Implementation...system of collection and event correlation of information security (SIEM). (Project team - 11 people, involved
||Project Management, Computer Security
||Mar 20, 2013
||Mar 20, 2013Ended
|2 Articles on Information Security
||I need 2 articles on information security topics. These topics are;
1-Introduction to Fuzzing Network...
2-customized fuzzing for SWF files
Both articles should be of 5 pages and must target the technical
||Ghostwriting, Book Writing
||May 24, 2011
||May 24, 2011Ended
|Articles on Information Security
||...We will provide an example of the final result. Articles are about 200/300 words in length. Italian language
||Copywriting, Blog, Articles, Reviews, Article Rewriting
||Jun 28, 2013
||Jun 28, 2013Ended
|Security Related Projects
||...should you have an innovative idea within IT/Information Security field for corporate/retail products/services
||Linux, Web Security, Computer Security, C# Programming, C++ Programming
||May 19, 2010
||May 19, 2010Ended
|Content Writer - Information Security
||...to hire a content writer that knows about information security, ethical hacking / penetration testing,...on-going or you could just write one or several articles. Up to you.
||Web Security, Computer Security, Ghostwriting, Articles, Academic Writing
||Dec 12, 2011
||Dec 12, 2011Ended
|Information Security Labs
||We need 10 to 20 labs and project for information security, in the computer science. The freelancer should...a list of the projects firsts. The list must include most aspect of computer security area. The project
||PHP, Linux, Web Security, Computer Security, Software Architecture
||Jul 16, 2013
||Jul 16, 2013Ended
|Information Security Evaluation Papers
||The subject is Information Security. I need two very short evaluation papers written. I have two websites...reasons for your viewpoint.
1. General information security, 1-2 pages. http://www.wilsonmar.com/1secvul...Prevention, 2-3 pages. http://www.studentpulse.com/articles/47/cyber-attack-prevention-for-the-home-user-
||Web Security, Computer Security
||Dec 7, 2012
||Dec 7, 2012Ended
|Website content – Information Security
||...mine is in need for website content in the information security industry.
I would like to find a long-term...
The bidder MUST show experience in the information security industry content writing, or in a domain...this bidding is for 2 (two) pages. Sequential projects are not guaranteed to awarded bidders.
||Technical Writing, Articles
||Aug 31, 2013
||Aug 31, 2013Ended
|Content Writing/ Website security / Information Security
I need 100 articles about Website security. It must be interesting, topics connected to our products...Example, website security, sql injection preventing, cross site scripting security, tips, facts etc....paragraphs with some nice images.
some examples of articles you can find here
||Copywriting, Computer Security, Ghostwriting, Content Writing, Internet Security
||Jun 9, 2015
||Jun 9, 2015Ended
|Needs 20 original articles on Information Technology/Security
||Needs 20 original articles on modern topics on Information Technology and Security. Each article must
||Blog, Technical Writing, Articles, Academic Writing, Article Rewriting
||Dec 29, 2012
||Dec 29, 2012Ended
|IT ,SOFTWATE HARDWARE SECURITY PROJECTS IN UAE
||Information technology company , based in UAE , Abu Dhabi working since 2007 in this firm having project
||iPhone, Sales, Cloud Computing, Oracle, Cisco
||Feb 23, 2011
||Feb 23, 2011Ended
|Cybersecurity and Information Security content development
||...number of materials (fact sheets, articles etc) for an Information Security Awareness program for internal...write clear, non technical and user friendly information and can follow a brief.
||Copywriting, Technical Writing, Ghostwriting, Article Rewriting
||Jan 1, 2015
||Jan 1, 2015Ended
|Blog writers for writing on Information Security
||Wanted a person with experience in writing articles, blogs & copies for digital media
Will be writing...reputed company on information security, mobile app security, mobile device security, android app hacking...penetration testing, mobile device security, OWASP mobile top 10, android security, android tech, etc.
||Android, Blog, Articles
||Aug 8, 2014
||Aug 8, 2014Ended
|Guide To Personal Financial Information Security
||...consumers can protect their personal financial information and identity. I've written briefly about this...com/2015/06/how-i-learned-to-stop-worrying-and-embrace-the-security-freeze/
For this project, I would like a longer...to best protect their identity and financial information.
You can mention tools like Mint.com, CreditKarma
||Jun 8, 2015
||Jun 8, 2015Ended
|Various Projects, submitting information and photoshop images
||...Socks and high level security systems to assist us with various submissions & projects for our company. Must
||Data Processing, Photoshop
||Sep 16, 2014
||Sep 16, 2014Ended
||...asked.Any expert who has knowledge of IT / Information Security can do it easily.
Pls read our attachment
||Web Security, Computer Security, Technical Writing, Academic Writing, Database Administration
||Nov 22, 2012
||Nov 22, 2012Ended
||...understandable for a listener who is familiar with security, but not an expert in the presented topic.
||Web Security, Academic Writing, Internet Security
||Nov 26, 2014
||Nov 26, 2014Ended
||...student, with the challenge of applying the general security concepts, methodologies, and principles that were...discretion. However, please bear in mind that the security primary goals and objectives for availability
||Technical Writing, Report Writing, Academic Writing
||Dec 16, 2013
||Dec 16, 2013Ended