Computer Science Essays
The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.
Computer Science Essays & Related Services
Nessus report
Example essay. Last modified: 23rd Sep 2019
Nessus report In the realistic world, some people might go online and never think or have any concern about protection issues. To the contrary, which just a dream, as unluckily some are...
NMAP Scan: Features and Applications
Example essay. Last modified: 23rd Sep 2019
NMAP Scan Introduction: Before we tend to start with the technical intricacies of mastering Nmap, it is a sensible idea to know however Nmap itself began and evolved a...
Analysis of P1 Control Panel
Example essay. Last modified: 23rd Sep 2019
P1 Control Panel/VNC/Questioning of Users/Fault log and Solutions Database P1 explain the tools and techniques used for technical support What is the Control Panel? Th...
Agile Methodoloy Is Adaptive and Not Predictive
Example essay. Last modified: 23rd Sep 2019
Agile methodoloy is adaptive and not predictive Table of Contents 1. Abstract 2. Introduction and values of Agile 3. Principles of...
Systems Design of Cyber Security in Embedded Systems
Example essay. Last modified: 23rd Sep 2019
Summary On Systems Design of Cyber Security in Embedded Systems Embedded Systems which are mission oriented are referred as critical embedded systems. This paper describes the ...
Waterfall Methodology in Software Development
Example essay. Last modified: 23rd Sep 2019
The Waterfall Methodology The waterfall methodology is the most commonly used method in software development and is instinctively the most obvious way to develop software. But, the wate...
Vehicular Cloud Computing (VCC): Application Trends and Challenges in a New Paradigm
Example essay. Last modified: 23rd Sep 2019
Vehicular Cloud Computing (VCC): Application Trends and Challenges in a New Paradigm Outside the Box Research Literature Review Abstract The purpose of ...
Analysis of the Yahoo! Data Breaches
Example essay. Last modified: 23rd Sep 2019
Yahoo! A web service provider reported two major data breaches affecting over 1.5 billion accounts by the end of 2016. On further investigation, Yahoo confirmed that all 3 billion accounts were ...
Systems Architecture of a Central Processing Unit
Example essay. Last modified: 23rd Sep 2019
[Document title] [Document subtitle] Table of Contents Task 1 ...
Edge Computing and CDN
Example essay. Last modified: 23rd Sep 2019
Before understanding the concept of edge computing, cloudlets and fog computing, we need to understand what cloud computing is and why is it needed. Cloud computing provides computing services o...
Application of Machine Learning in Automobile Insurance
Example essay. Last modified: 23rd Sep 2019
Application of Machine Learning in Automobile Insurance Background Origin Although the concept of insurance had taken shape long before the existence of aut...
The Internet of Things: Revolutionizing the Retail Industry
Example essay. Last modified: 23rd Sep 2019
THE INTERNET OF THINGS: REVOLUTIONIZING THE RETAIL INDUSTRY ABSTRACT The internet has already connected people with people. Its reach is growing faster to modify even the...
Types of Cyber Attacks and Mitigation Strategies
Example essay. Last modified: 23rd Sep 2019
Technical Research Paper Report Contents Attack Types of Attack TCP Attack TCP Hijacking IP Spoofing: Assuming the identity ...
Cybersecurity and the Black Market
Example essay. Last modified: 23rd Sep 2019
Cybersecurity and the Black Market Abstract— The emergence of the dark web has led to a huge increase in malicious activities conducted on the Internet such as mone...
Monitoring and Analysing Anomaly Activities in a Network Using Packetbeat
Example essay. Last modified: 23rd Sep 2019
Monitoring and Analysing anomaly activities in a network using Packetbeat Abstract: The primary intention of any organization is to provide security for their i...
A Systematic Study of Asset Management using Hybrid Cyber Security Maturity Model
Example essay. Last modified: 23rd Sep 2019
A Systematic Study of Asset Management using Hybrid Cyber Security Maturity Model ABSTRACT There are persistent cyber security attacks which leads unauthorized access to int...
Case Study on Network Management Protocols
Example essay. Last modified: 23rd Sep 2019
Table of Contents Introduction Task 1 Task 2 Task 3 Task 4 Bibliography Introduction AUT i...
Research Report on Cryptographic Hash Functions
Example essay. Last modified: 23rd Sep 2019
RESEARCH REPORT ON CRYPTOGRAPHIC HASH FUNCTIONS This report presents various cryptographic hash functio...
Data Flow testing using Genetic Algorithms
Example essay. Last modified: 23rd Sep 2019
Data Flow testing using Genetic Algorithms Abstract Testing a software plays a very key role in software development life cycle. There are two types of testi...
Reverse Engineering the Behaviour of NotPetya Ransomware
Example essay. Last modified: 23rd Sep 2019
Reverse Engineering the Behaviour of NotPetya Ransomware warna Pujitha kolli 1 , Dr.K.V.D.Kiran 4 ...
Analysis of Stuxnet Computer Virus
Example essay. Last modified: 23rd Sep 2019
Analysis of Stuxnet Computer Virus [Document subtitle] Table of Contents Executive Summary: 1. Introduction/Background: 2. St...
Improving the Software Development Process Using Testability Tactics
Example essay. Last modified: 23rd Sep 2019
Improving the Software Development Process Using Testability Tactics Abstract: Need and building stable software application is becoming more and more important considering th...
Reconfigurable Hybrid Cache Hierarchy in 3D Chip-Multi Processors
Example essay. Last modified: 23rd Sep 2019
Reconfigurable Hybrid Cache Hierarchy in 3D Chip-Multi Processors Based on a Convex Optimization Method Abstract—Chip-Multi Processor (CMP) design process has been con...
Hand Tracking Piano App for Windows
Example essay. Last modified: 23rd Sep 2019
Contents 1 Introduction……………………………………………………1 1.1...
Measuring the Concentration of Ozone in Solution, with Time
Example essay. Last modified: 23rd Sep 2019
Table Contents Abstract 1.0 Aims and objectives of the experiment 2.1 Theoretical and experimental basis: 2.2 Experimental Procedure...
Tip: If you can't find what you are looking for, try shortening your search phrase. E.g. "CSR"