Galle, Southern, Sri Lanka
$10/hr · Starting at $30
WORLD WIDE UNLOCK CODE ANY DEVICE ANY NETWORK Works with most major handset brands Please discuss with me before place order. money-back guarantee.
Worcester, Massachusetts, United States
$5/hr · Starting at $25
Expertise in networking (Cisco Nexus, HPE ToR switches, Check Point/Juniper firewalls), Linux (Centos, Ubuntu), OpenStack, Docker, scripting
Jakarta, Jakarta Raya, Indonesia
$50/hr · Starting at $25
Experienced IT Security professional with expertise in network security. Outstanding customer service skills resolving technical issues and educating end-users. Team player making significant contribu…
Pimpri-Chinchwad, Maharashtra, India
$8/hr · Starting at $25
I have experience working in MNC into recruitment. I used to recruit candidates through portals , social networking sites etc. I also have basic working experience in Excel. I can work on Recruitment…
Bengaluru, Karnataka, India
$20/hr · Starting at $25
Worked on endpoint security management, server management, Linux admin skills, technical support , Qa/ testing with servers , networking products, good experience in linux ,vmware, cloud.
Pathankot, Punjab, India
$10/hr · Starting at $25
Hii my self Abhinav from pathankot in punjab I am student in btech It for many knowledge of IT field like that html , networking , any more
Lahore, Sindh, Pakistan
i have a good command over white hate seo, web development and wordpress sites. i have been working for two years in network trends software house..
Albuquerque, New Mexico, United States
$80/hr · Starting at $25
Network hardware repair and replacement. Also services most low voltage technology within commercial platforms.
DAYTON, Ohio, United States
$75/hr · Starting at $75
Installation and Service of Ethernet, Fiber, DSL, DS-1 DS-3, POTS. Installation and Tresting of IADS,routers and Switches. Installation of VOIP phones, PBX and Hosted. Installation and service of WI…
Delhi, Delhi, India
2 Years of experience in Linux (ubunut, debian) , Networking and IT Security VAPT. Setup full environment for business ( Jenkins, Nagios, Nginx,
Chennai, Tamil Nadu, India
we have knowledge in computer system and server level and also electrical and electronics engg web design electronics security level and networking.
Vallauris, Provence-Alpes-Cote d'Azur, France
$33/hr · Starting at $25
Can develop Social Media Management, Social Network Administration, Social Networking Development and Social Media Optimization for your company.
Beawar, Rajasthan, India
Development(php,mysql) dataentry typing math teacher english grammer science teacher networking Internet
BREMEN, Georgia, United States
$40/hr · Starting at $40
Software and Web Development; Automation Engineering; Software Architecture; DevOps; Network and Application Security
Grand Rapids, Michigan, United States
$30/hr · Starting at $25
I provide service in troubleshooting computer, web design, build server, security and setup network works for both personal and small businesses.
rajpura, Punjab, India
i do work on data entry . i done my work on time.I also on efffective way.apart from this i have experience on social networking .i have experiance of 7 years
Manama, Manama, Bahrain
I'm IT specialist who can help you to design the best solution for your IT needs and implement and operate and support you infrastructure and protect it with the perfect security.
Dhaka, Dhaka, Bangladesh
$12/hr · Starting at $30
Ambitious to work hard in order to achieve the best, for the betterment of carrier & personal objectives. Always ready to approach any project and also have confidence in self abilities and determine
ANTONY, Ile-de-France, France
decision tree, neurone network, those are the most used technics for classification , I can provide you a python code using tensorflow or keras librairies , for a classification project
Rawalpindi, Punjab, Pakistan
Penetration testing, more commonly called pentesting, is the practice of finding holes that could be exploited in an application, network or system with the goal of detecting security vulnerabilities