We now accept

Faster and secure way to pay.

octoberbaby Avatar

octoberbaby

Registered: March, 2019online
I am a research-focused writer with an excellent command of English. I deliver exceptional work and that is why I should be your preferred writer.
Request this writer

Average rating: 9.24

Has awards:

Writer's awards

Triple Ten × 146
10 orders in 10 days with the rating of 10
Last awarded: Dec 4, 2021
Nine Plus
Current rating of 9 or over
Last awarded: Feb 2, 2020
Proven Punctuality
Over 80% of orders delivered ahead of the deadline (rated 8 or higher)
Last awarded: Dec 2, 2021
Proven Reliability
Over 97% of orders are completed (rated 8 or higher)
Last awarded: Feb 27, 2021
Customer Loyalty
Over 20% of return customers
Last awarded: Mar 26, 2021
1766 orders finished
4 orders canceled by this writer
9 orders in progress
12 orders canceled by her customers

Computer science

Rating in this discipline:

9.88
Feedback:
Show all
10 stars15
9 stars0
8 stars1
7 stars0
6 stars0
1-5 stars0
Page 1 of 1 (16 orders)

Cloud shifting or chain security

Research paper , Computer science, 4 pages#209383409, Completed
Customer’s feedback:
Finished work 2 days before due date, very helpful and did a great job!

Letter of Recommendation

10000 , Computer science, 1 page#206169077, Completed
Customer’s feedback:
The best writer

RISK OF USING WIRELESS NETWORKS FOR COMMUNICATION IN THE MILITARY

Essay (any type) , Computer science, 4 pages#205228767, Completed
Customer’s feedback:
GREAT SERVICE!

CSS380 Unit 3 IP

PowerPoint Slides , Computer science, 4 pages#194821307, Completed
Customer’s feedback:
thanks

Constitutional Foundations of Cyber Law

Research paper , Computer science, 3 pages#195532599, Completed
Customer’s feedback:
Great job and ahead of schedule!

CSS380 Unit 3 DB

Discussion Board , Computer science, 2 pages#194353323, Completed
Customer’s feedback:
on time

CSS380 Unit2 DB

Discussion Board , Computer science, 2 pages#194353317, Completed
Customer’s feedback:
on time

Incident Response Policy

Case study , Computer science, 2 pages#194842993, Completed
Customer’s feedback:
Great

Application Security

Coursework , Computer science, 1 page#194208523, Completed
Customer’s feedback:
Perfect

A brief Summary of Two Types of Data Breach Attack Vectors

Case study , Computer science, 2 pages#194185443, Completed
Customer’s feedback:
Excellent

IT Ethics 5

Essay (any type) , Computer science, 3 pages#192084087, Completed
Customer’s feedback:
Awesome

Systems Integration

Essay (any type) , Computer science, 6 pages#185673981, Completed
Customer’s feedback:
Quick and friendly

Cloud computing and machine learning and how they connect to software verification

Research paper , Computer science, 6 pages#184299217, Completed
Customer’s feedback:
i like it so far, i needed couple changes would that be able to be done?

cybersecurity

Coursework , Computer science, 5 pages#184737023, Completed
Customer’s feedback:
best writer

Explain and analyze the RESPOND Function of the NIST CSF. How would this be applied in a business setting while implementing the NIST CSF?

Essay (any type) , Computer science, 3 pages#183730973, Completed
Customer’s feedback:
AMAZING JOB! I am VERY happy with this paper! I will most definitely be using this writer again in the near future! She delivered a very clear, concise, and well written paper!

Any topic (writer's choice)

Research paper , Computer science, 2 pages#180400739, Completed
Customer’s feedback:
Perfect