1843 reviews

Computer Science Essays

The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.

Essay Writing Service

Example Computer Science Essays (Page 6)

Applications and Challenges of Low Latency Networks
Example essay. Last modified: 8th Feb 2020
Introduction: ABSTRACT Networking development and research have historically focused on increasing network throughput and path resource utilization. And that have particularly helped bulk applications...

Evaluation of Amazon's Cloud Computing
Example essay. Last modified: 8th Feb 2020
Introduction: Table of Contents Summary Introduction Category 1: Compute a.  Amazon Elastic Compute Cloud (Amazon EC2) b.  Amazon Elastic Load B...

GPU Accelerated Parallel Heuristic for the 2D Knapsack Problem
Example essay. Last modified: 8th Feb 2020
Introduction: A GPU accelerated parallel heuristic for the 2D knapsack problem with rectangular pieces Abstract: The 2D Knapsack Problem is one of the typical NP-hard problems in combinatori...

Deep Residual Learning for Image Recognition
Example essay. Last modified: 8th Feb 2020
Introduction:   Abstract Deeper neural networks are harder to prepare. We present a residual learning structure to facilitate the preparation of networks that are significantly deeper t...

Malware Attacks And Their Impacts
Example essay. Last modified: 8th Feb 2020
Introduction:   Abstract—With always evolving technologies many devices are emerging which has the ability to connect to other devices across the world using internet, it ...

WiFi Eavesdropping: Attack Overview and Challenegs
Example essay. Last modified: 8th Feb 2020
Introduction: Wifi Eavesdropping Abstract – Below report describes about Wi-Fi eavesdropping, then an explanation on how it works and then further tells about its latest and most famous ...

Description of Trojan Attacks
Example essay. Last modified: 8th Feb 2020
Introduction: Trojan Abstract—The amount of electronic devices associated with the internet is constantly on the rise, with increasing number of devices there is also an expansion in the ...

The Melissa Virus: Origins and Impact
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract With the creation of ARPANET and its evolution into the internet we know today, malware has become a prevalent force affecting users globally. A simple, non-replicating and beni...

Cisco Systems Architecture: ERP and Web-enabled IT
Example essay. Last modified: 8th Feb 2020
Introduction: Background  Cisco System was founded in 1984 by two Stanford computer scientists, Sandy Lerner and Leonard Bosack1,2. The company was built on the vision of a “New World Network1....

Review of A Health Care Data Breach – Anthem 2015
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract  The Anthem Data Breach was the largest of its kind at the time and was one of the first times that a cybersecurity incident was actively covered in mainstream media. This ...

CI and CD in AWS Code Pipeline
Example essay. Last modified: 8th Feb 2020
Introduction:   Abstract Software firms are increasingly using and contributing to DevOps software. Many companies now use pipelines for better efficiency. To do this they need to unders...

Fifth Generation Mobile Networks: Challenges and Future Research
Example essay. Last modified: 8th Feb 2020
Introduction: FIFTH GENERATION (5G) Mobile Networks ABSTRACT Fifth generation (5G) mobile network is not only the successor of its previous mobile networks (4G,3G,2G) but also the beginning ...

Ways of Improper Access Control
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract—This paper defines about the different ways of improper accessing of web servers, application servers and databases and the various ways of avoiding the...

Multicast Protocols: Challenges and Future Research
Example essay. Last modified: 8th Feb 2020
Introduction: ABSTRACT Multicast in terms of IP is a method of transferring Internet Protocol datagrams to a group of involved receivers in a single broadcast. The IP specific for...

Anti -Reverse Engineering Techniques employed by Malware
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract— In Modern days, analyzing the malware samples through reverse engineering methodologies became more difficult because the malware authors are using Anti-reverse engineerin...

Standard Operating Procedure for Pen Testing
Example essay. Last modified: 8th Feb 2020
Introduction: 1.0   Introduction   The pen testing methodologies it is a very important thing for the organization because they test of the operational security of physical loc...

Cloud Computing: Security and Infrastructure
Example essay. Last modified: 8th Feb 2020
Introduction: Table of Contents Introduction Cloud security and infrastructure Application and impact of the research area Large Businesses Small Businesses ...

Managing Virtual Environments: Server Comparison
Example essay. Last modified: 8th Feb 2020
Introduction: Table of Contents Physical Server and Specifications Vendor Selection Hypervisor Comparison VMware 6.5 Hyper-V 2016 VCenter deployment ...

Applying User-centred Design to Modern Software Products
Example essay. Last modified: 8th Feb 2020
Introduction: Introduction The following report evaluates “Applying user-centred design to modern software products” based on ISO 9241-210 standard. “ISO 9241-210 provides a set of requirements ...

Prediction of Coronary Heart Disease using Supervised Machine Learning Algorithms
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract — The field of medical analysis is often referred to be an invaluable source of rich data yet with poor insights and medical outcomes. Coronary Heart Disease (CHD) is one of the major ...

Supervised Machine Learning Algorithms: Classification Techniques
Example essay. Last modified: 8th Feb 2020
Introduction:   Abstract: Supervised machine learning is a function for algorithms that has purpose to visibly provided instances to produce general hypotheses, which formerly make predictions a...

Hardware Techniques to Mitigate Fault Attacks
Example essay. Last modified: 8th Feb 2020
Introduction: Abstract— An act which is to a deliberate control of the incorporated circuit or its state, with an aim to incite a mistake inside the coordinated circuit with the end goal to move the gadget i...

Overview of Object Oriented Programming
Example essay. Last modified: 8th Feb 2020
Introduction: Object-oriented programming is a new way of approaching the job of programming. Programming over the years has evolved to accommodate the increased complexity of programs, it has been become a wi...

Will Quantum Computing be a Threat to our Cybersecurity?
Example essay. Last modified: 8th Feb 2020
Introduction: The smaller computers get, the more powerful they become. Today’s smartphones are more powerful than military computers created 50 years ago. Regardless of this, there are still many problems o...

Get Academic Help Today!

Encrypted with a 256-bit secure payment provider