need an IT specialist? → photographer → experienced developer Jan B. Fiedler | email ogcEpijj+a` | phone +49 6483 24 90 35 MSCS (Diplom-Informatiker), certified IT-Security expert → #zuloo | irc.freenode.com → vCard → fork me on github → gpg public key | fingerprint E5CE 3B3A 610F B167 DE42 8063 31FB BDD8 4D91 3059 → agb → impress

Webdesign,

d3.js, Data Driven Documents, Design, CSS3, Cascading Style Sheets, LESS, SASS, HTML5, HyperText Markup Language, JavaScript, Phonegap, jQuery, Prototype, SVG, Scalable Vector Graphics, Actionscript 3, Red5, Web 2.0, Roundcube, Wordpress, Drupal, Joomla, Typo3, Extbase, Flow, OSCommerce, XTCommerce, Magento, Full Page Cache, Customization, Performance Optimization, Lucene, Solar, Enterprise Search,

Guerillia Marketing, Social Media Marketing,

Layout, Printdesign,

Photoshop, GIMP, Blender, Indesign, Scribus, Illustrator, Inkscape, Flash,

Software Development,

Java, PHP, MySQL, PostgreSQL, Perl, Python, C++, Visual Basic, Mips, Assembler, XML, eXtensible Markup Language, Hybernate, Facelets, Java Server Faces, JSF, JSP, Spring MVC, OSGi, J2EE, Java EE 6, EJB, EclipseLink, ORM, Object Relational Mapping, Zend Framework, CakePHP,

SOAP, Simple Object Access Protocol, MVC, Model View Controler, RESTful, Representational State Transfer, AJAX, Asynchronous Javascript and XML, Security by Design, Unit Tests, System Architecture, Scrum, Agile Develpmenmt, Pair Programming, Plan Do Check Act, Continuous Integration, Extreme Programming, Test Driven Development, Jenkins, GIT, Gitlab, subversion, SVN,

Administration,

IT Security, Infrastructure, Linux, LVM2, glassfish, JBoss, Tomcat, Apache, fail2ban, postfix, iptables, sh, Bash Script, Administration, Network, Penetration Test, Firewall, Traffic Shaping, Mod Rewrite, Access Control, XACML,

eXtensible Access Control Markup Language, Brute Force Protection, Intrusion Detection, Security Policy Enforcement, Dictionary Attack, Side Channel Attack, openVPN, Virtual Private Network, Kernel-based Virtual Machine, open stack, XEN, XCP, KVM, Debian, memcached,

Freelancer, Freiberufler, Darmstadt, erweitertes Rhein Main Gebiet, Aschaffenburg, Heidelberg, Frankfurt, Mainz, Wiesbaden, Expert, Spezialist, Nerd, Professional, Beratung, Schulungen, Consultant, Coaching,

Public Key Infrastruktur, Kryptographie,

Security Goals, Confidentiality, Integrity, Authenticity of Data, Entity Authenticity, Non-repudiation, Availability, Public Key Cryptography, Encryption (symmetric, assymetric, hybrid, cryptosystems, key exchange, preformance, security, computability), Cryptographic Hash Functions, Message Authentication Codes, Digital Signatures (performance, standards), Certificates, X.509 Public Key Certificates (properties, content, extensions), PGP, WAP Certificates, Attribute Certificates,

Trust Models, Direct Trust, Web of Trust, Hierarchical Trust, Private Keys, Software Personal Security Environments (PKCS#12, Java Keystore, application specific ), Hardware Personal Security Environments (smart cards, hardware security modules, java cards), Private Key Life-cycle, Revocation (reaons for, requirements, criteria), Certificate Revocation Lists, Delta Certificate Revocation, Lists, Other Certificate Revocation Lists (over-issued, indirect, redirect), OCSP, Other Revocation Mechanisms (NOVOMODO), Certificate

Life-cycle Policies, Certificate Policy and Certification Practice, Statement, Set of Provisions, Validity Models, Shell Model, Modified Shell Model, Chain Model, Certification Path Validation, Trust Center, Registration Authority (registration protocols, proof-of-possession, extended validation certificates), Certification Authority, Certificate Management Authority, Certification Paths and Protocols Construction, LDAP and other methods, SCVP, Timestamping, Long Term Archiving Signatures, cryptosystem implementation, ciphers, attacks, optimization, security concepts, practical implementation of cryptography and security applications,

IT Sicherheits Management,

Kenntnisse, Inhalte und Strukturen, IT-Sicherheitsmanagementsystems (ISMS). Überblick über gängige Verfahren und deren Grenzen hinsichtlich eines IT-Sicherheitsmanagements, wie z.B. ISO/IEC 17799:2005 bzw. ISO 27002:2007, ISO/IEC 27001:2005, Risikoanalysen und -verfahren wie z.B. IT-GsHb des BSI und British Standards (BS 7799-3:2006 zukünftig: ISO/IEC 27003:2006)

sowie verschiedene ROSI Ansätze, CoBiT und OCTAVE. Erkenntnisse über die Bestimmung der Assets eines Unternehmens bzgl. der IT-Sicherheit und deren Einordnung hinsichtlich Verfügbarkeit, Vertraulichkeit und Integrität. Systematische Bewertung einer Unternehmens Sicherheit anhand von Metriken. Entwicklung von Reifegrad Modellen in Form eines Capability Maturity Model (CMM),

Informationssicherheit, IT-Sicherheitsziele und -strategien, IT-Sicherheitsmmanagementprozess, Informationsmanagementsystem (IMS), Informationsicherheitsmanagementsystem (ISMS), IT-Sicherheitsmanagement (ITSM), Analysen von Schwachstellen und Bedrohungen in Abhängigkeit der Assets, Stochastische und zeitliche Aspekte des Risikos,

Risikomanagementsysteme, Entscheidung im Umgang / Übernahme von Risiken mit Methoden der normative / deskriptiven Entscheidungstheorie, Modellierungsaspekte des Risikos mittels Prozess Algebra und Graphentheorie, BASEL II (mit baysianischen Netzen und Monte-Carlo Simulation), Sarbanes-Oxley Acts (SOX), Bewertungsverfahren und Metriken der IT-Sicherheit sowie eines ISMS, Ansätze zum Bussiness Continuity Planning (BCP) und Business Continuity Management System (BCMS) nach BS 25999-2:2007, Metriken zur Bewertung eines ISMS, BCMS, QMS und IMS, Anwendung des Capability Maturity Model (CMM) auf die IT-Sicherheit,

Sicherheit in Multimedia Systemen und Anwendungen,

Partielle Verschlüsselungsverfahren für Video und Audio zur Sicherung der Vertraulichkeit und der Authentizität,Digitale Wasserzeichen für Bild und Audio – Anwendungsgebiete, Digital Rights Management, Kopierschutzverfahren, Visuelle Kryptographie, security in distributed multimedia systems, multimedia security, partial encryption, steganography, digital watermarking, video and image forensics,

IT Sicherheit & Mobile Security,

Trusted Computing, Security Engineering, Common Criteria, Access Control, Digital Rights Management, Authentication, Key Exchange, Biometrics, Network Security, Steganography, Software Security, Privacy, Trusted Computing, Network security, communication security, security mechanisms, security protocols, security threats, wireless and mobile systems security, distributed system security, Implementing Secure & Reliable Software, Software Testing, Runtime Monitoring, Profiling, Security Analysis, Critical Infrastructures, Safety-Critical

Systems, Human Centered Security, Sicherheitsmodelle, Authentifikation, Zugriffskontrolle, Sicherheit in Netzen, gängige Mechanismen und Protokolle zur Erhöhung der IT-Sicherheit moderner Systeme, Sicherheitsbetrachtung und Modellierung von Bedrohungen bei mobilen Systemen (Broadcast-Natur des drahtlosen Kanals, Ressourcenbeschränkungen, Sicherheit in IEEE 802.11 Netzen, WEP, WPA, WPA2, DoS Angriffe, Sicherheit in GSM und UMTS zellularen Netzen, Angriffe und Verteidigungsmaßnahmen, Sicherheit in drahtlosen Sensornetzen (Wireless Sensor Networks –

WSN, Angriffserkennung, Leistungsfähigkeit vs. Performanz, Angriffe auf die beschränkten Energieressourcen, Authentisierung und Vertraulichkeit für ressourcenbeschränkte Geräte, sichere Routingprotokolle für Mobile Ad hoc Netze (MANET), sichere lokalisierte Routingverfahren,

Netwerksicherheit & Web Application Security,

Network security, communication security, security mechanisms, security protocols, security threats, operational network security, Internet security, applied cryptography, applied IT Security, Sicherheitsstandards für Netze und das Internet, Bedrohungen, Angriffe, Sicherheitsdienste und -mechanismen, Kryptographische Grundlagen zur Absicherung von Netzen, symmetrische Kryptographie und deren Anwendung in Netzen, asymmetrische Kryptographie und deren Anwendung in Netzen, unterstützende Mechanismen zur Implementierung von

Sicherheitslösungen, Sicherheit auf den einzelnen OSI-Schichten, Anwendungsschicht, Transportschicht, Vermittlungsschicht, Sicherungsschicht, physikalische Schicht, Sicherheit für verteilte Systeme, Sicherheit für peer-to-peer Netze, Sicherheit für Internettelefonie, Firewalls, Intrusion Detection Systems, Automated Auditing of Web Applications, Cross Site Scripting, SQL Injection, Web Tracking and Fingerprinting, Security and Privacy in Cloud Computing, Server and Service Hardening,

Knowledge Engineering, Datamining,

Webmining, Text classification, Web Spidering, Google's PageRank, Web Structure Mining, Wrapper induction, Recommender Systems, Data and Knowledge Engineering, Business Intelligence, Data Warehousing, Big Data, Data Visualization, Visual analytics, Information Visualization, BI Architectures, BI Modeling, Star Schema, Multi-Dimensional Models, Special DW/BI Operators, Optimization of Dws,

partitioning, aggregates, histograms and other query optimization techniques, Multi-Dimensional Data (CUBE, Special Query Languages), Special index methods, Smart implementation of operators, Back room operations, ETL processes: data extraction, data cleansing, data loading, Column-Oriented Databases in Business Intelligence, Data Warehousing Appliances, Parallelisierbarkeit mit verteilten Plattformen, Hadoop, MapReduce,

Machine Learning,

Statistical Methods for Machine Learning, Bayes Decision Theory, Density Estimation, Linear Models for Classification and Regression, Statistical Learning Theory, Kernel Methods and Support Vector Machines, Graphical Models for Learning, Approximate Inference, Graphical Models in Machine Learning, Inference Mechanisms and Sampling Strategies in graphical models, Gaussian Processes, Probabilistic Topic Models, Unsupervised and Semi-Supervised Learning,

Computer Vision,

Bildrepräsentation, Bildtransformation, Bildwahrnehmung, Farbmodelle, Bildverbesserung und Bildrestoration, Pixel Operationen, Filterung, Bildanalyse, Auflösungspyramiden, Merkmalserkennung, Segementierung, Morphologie, Bild- und Videokompression, Tiefenbilder, object recognition, object categorization, global and local approaches, deformable models, local descriptors and interest points, part representations,

combination with segmentation, stereo, motion estimation, tracking, segmentation, appearance-based modeling, bag-of-words modeling, structure from motion, simultaneous localization and mapping, real-time rendering, color systems, light simulation, virtual reality, augmented reality, camera calibration,

Robotik,

homogeneous transformations, forward and inverse kinematics of manipulators, vehicle kinematics, velocity and manipulator Jacobian, robot dynamics,control of robots, path and trajectory planning for manipulators and mobile robots, external and intelligent sensor systems (visual sensors and algorithms, non-visual sensors and algorithms), sensor fusion, localization and positioning, navigation, architecture of autonomous robotic systems, development of functions for autonomous robotic systems, experimental evaluation,

Photography, Artwork, etc.