1856 reviews

Computer Science Essays

The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.

Essay Writing Service

Example Computer Science Essays (Page 9)

Tor Battlefield: Infiltrating Darkweb Operations
Example essay. Last modified: 23rd Sep 2019
Introduction: Tor Battlefield: Infiltrating Darkweb Operations Technology utilized by law enforcement to investigate and respond to criminal activity and terrorism has rapidly evolved to increase eff...

Nessus report
Example essay. Last modified: 23rd Sep 2019
Introduction: Nessus report In the realistic world, some people might go online and never think or have any concern about protection issues. To the contrary, which just a dream, as unluckily some are...

NMAP Scan: Features and Applications
Example essay. Last modified: 23rd Sep 2019
Introduction: NMAP Scan Introduction: Before we tend to start with the technical intricacies of mastering Nmap, it is a sensible idea to know however Nmap itself began and evolved a...

Analysis of P1 Control Panel
Example essay. Last modified: 23rd Sep 2019
Introduction: P1 Control Panel/VNC/Questioning of Users/Fault log and Solutions Database P1 explain the tools and techniques used for technical support What is the Control Panel? Th...

Agile Methodoloy Is Adaptive and Not Predictive
Example essay. Last modified: 23rd Sep 2019
Introduction: Agile methodoloy is adaptive and not predictive Table of Contents 1. Abstract 2. Introduction and values of Agile 3. Principles of...

Systems Design of Cyber Security in Embedded Systems
Example essay. Last modified: 23rd Sep 2019
Introduction: Summary On Systems Design of Cyber Security in Embedded Systems Embedded Systems which are mission oriented are referred as critical embedded systems. This paper describes the ...

Waterfall Methodology in Software Development
Example essay. Last modified: 23rd Sep 2019
Introduction: The Waterfall Methodology The waterfall methodology is the most commonly used method in software development and is instinctively the most obvious way to develop software. But, the wate...

Vehicular Cloud Computing (VCC): Application Trends and Challenges in a New Paradigm
Example essay. Last modified: 23rd Sep 2019
Introduction: Vehicular Cloud Computing (VCC): Application Trends and Challenges in a New Paradigm  Outside the Box Research Literature Review Abstract The purpose of ...

Analysis of the Yahoo! Data Breaches
Example essay. Last modified: 23rd Sep 2019
Introduction: Yahoo! A web service provider reported two major data breaches affecting over 1.5 billion accounts by the end of 2016. On further investigation, Yahoo confirmed that all 3 billion accounts were ...

Systems Architecture of a Central Processing Unit
Example essay. Last modified: 23rd Sep 2019
Introduction: [Document title]  [Document subtitle]  Table of Contents Task 1 ...

Edge Computing and CDN
Example essay. Last modified: 23rd Sep 2019
Introduction: Before understanding the concept of edge computing, cloudlets and fog computing, we need to understand what cloud computing is and why is it needed. Cloud computing provides computing services o...

Application of Machine Learning in Automobile Insurance
Example essay. Last modified: 23rd Sep 2019
Introduction: Application of Machine Learning in Automobile Insurance Background Origin   Although the concept of insurance had taken shape long before the existence of aut...

The Internet of Things: Revolutionizing the Retail Industry
Example essay. Last modified: 23rd Sep 2019
Introduction: THE INTERNET OF THINGS: REVOLUTIONIZING THE RETAIL INDUSTRY ABSTRACT  The internet has already connected people with people. Its reach is growing faster to modify even the...

Types of Cyber Attacks and Mitigation Strategies
Example essay. Last modified: 23rd Sep 2019
Introduction: Technical Research Paper Report Contents Attack Types of Attack TCP Attack TCP Hijacking IP Spoofing: Assuming the identity ...

Cybersecurity and the Black Market
Example essay. Last modified: 23rd Sep 2019
Introduction: Cybersecurity and the Black Market   Abstract— The emergence of the dark web has led to a huge increase in malicious activities conducted on the Internet such as mone...

Monitoring and Analysing Anomaly Activities in a Network Using Packetbeat
Example essay. Last modified: 23rd Sep 2019
Introduction: Monitoring and Analysing anomaly activities in a network using Packetbeat   Abstract: The primary intention of any organization is to provide security for their i...

A Systematic Study of Asset Management using Hybrid Cyber Security Maturity Model
Example essay. Last modified: 23rd Sep 2019
Introduction: A Systematic Study of Asset Management using Hybrid Cyber Security Maturity Model ABSTRACT There are persistent cyber security attacks which leads unauthorized access to int...

Case Study on Network Management Protocols
Example essay. Last modified: 23rd Sep 2019
Introduction:     Table of Contents Introduction Task 1 Task 2 Task 3 Task 4 Bibliography Introduction AUT i...

Research Report on Cryptographic Hash Functions
Example essay. Last modified: 23rd Sep 2019
Introduction:     RESEARCH REPORT ON CRYPTOGRAPHIC HASH FUNCTIONS     This report presents various cryptographic hash functio...

Data Flow testing using Genetic Algorithms
Example essay. Last modified: 23rd Sep 2019
Introduction: Data Flow testing using Genetic Algorithms Abstract   Testing a software plays a very key role in software development life cycle. There are two types of testi...

Reverse Engineering the Behaviour of NotPetya Ransomware
Example essay. Last modified: 23rd Sep 2019
Introduction: Reverse Engineering the Behaviour of NotPetya Ransomware warna Pujitha kolli 1 , Dr.K.V.D.Kiran 4         &#x...

Analysis of Stuxnet Computer Virus
Example essay. Last modified: 23rd Sep 2019
Introduction: Analysis of Stuxnet Computer Virus  [Document subtitle]  Table of Contents Executive Summary: 1. Introduction/Background: 2. St...

Improving the Software Development Process Using Testability Tactics
Example essay. Last modified: 23rd Sep 2019
Introduction: Improving the Software Development Process Using Testability Tactics Abstract: Need and building stable software application is becoming more and more important considering th...

Reconfigurable Hybrid Cache Hierarchy in 3D Chip-Multi Processors
Example essay. Last modified: 23rd Sep 2019
Introduction: Reconfigurable Hybrid Cache Hierarchy in 3D Chip-Multi Processors Based on a Convex Optimization Method Abstract—Chip-Multi Processor (CMP) design process has been con...

Hand Tracking Piano App for Windows
Example essay. Last modified: 23rd Sep 2019
Introduction: Contents 1 Introduction……………………………………………………1 1.1&#x...

Get Academic Help Today!

Encrypted with a 256-bit secure payment provider