I accept receiving promo codes and other educational info from this company.
Get My Code
Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.
This 6 page paper discusses Bluetooth technology in detail, but at a layman's level. Bibliography lists 5 sources.
This 2.5-paper focuses on Bluetooth technology, a radio frequency based communications standard and technology that is being hailed as a great cost saver (as it replace cable connection lines). The paper discusses the history of Bluetooth, as well as the interesting name. Bibliography lists 7 sources.
12 pages in length. That hacking was present in the phone system over one hundred years ago speaks to a problem that has experienced a slow but steady evolution. The 1960s, however, is where the timeline of contemporary hacking gets its start, continuing on into the 1970s with John Draper – aka Captain Crunch – hacking the phone company by mimicking the tone that opens a line. By the 1980s, hacking had become much more sophisticated as a vast new entity called 'cyberspace' was introduced to the world. Bibliography lists 15 sources.
This 3 page paper analyzes an article about information security, hacking, cracking and privacy. Bibliography lists 2 sources.
In 10 pages, the author discusses the ethics of computer hacking and spreading computer viruses. Bibliography lists 11 sources.