• The Open Computer Forensics Architecture (OCFA) is a distributed open-source computer forensics framework used to analyze digital media within a digital...
    2 KB (145 words) - 07:13, 8 January 2025
  • Forensic Architecture is a multidisciplinary research group based at Goldsmiths, University of London that uses architectural techniques and technologies...
    27 KB (2,582 words) - 06:31, 2 June 2025
  • mainly focused on computer forensics, although in recent years similar tools have evolved for the field of mobile device forensics. This list includes...
    11 KB (662 words) - 20:02, 15 May 2025
  • refer to: Odd-chain fatty acid Orange County Fire Authority Open Computer Forensics Architecture This disambiguation page lists articles associated with the...
    145 bytes (47 words) - 23:08, 21 February 2020
  • Anti–computer forensics or counter-forensics are techniques used to obstruct forensic analysis. Anti-forensics has only recently[when?] been recognized...
    24 KB (2,933 words) - 17:47, 26 February 2025
  • Security Studies and Research Forensic Toolkit: by AccessData, used by law enforcement Open Computer Forensics Architecture: An open-source program for Linux...
    30 KB (3,635 words) - 00:43, 18 June 2025
  • Thumbnail for Computer hardware
    both at the same time—often throttling the system's performance. Computer architecture requires prioritizing between different goals, such as cost, speed...
    38 KB (4,448 words) - 23:27, 16 June 2025
  • Thumbnail for Computer security
    Definition of Cyber Security". Journal of Digital Forensics, Security and Law. 12 (2). ISSN 1558-7215. Computer security at the Encyclopædia Britannica Tate...
    220 KB (22,314 words) - 10:38, 16 June 2025
  • Thumbnail for Kali Linux
    Kali Linux (category Digital forensics software)
    the Hindu goddess kali) is a Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security...
    27 KB (2,227 words) - 19:07, 17 June 2025
  • Thumbnail for C-DAC Thiruvananthapuram
    such as open source software, multilingual tools, and different training courses. The courses offered includes Diploma in Cyber Security & Forensics, Diploma...
    12 KB (1,174 words) - 20:26, 10 February 2025
  • distributions of digital forensics and penetration testing: Kali Linux, BackTrack, DEFT, Security Onion Matriux BackBox CERT Linux Forensics Tools Repository...
    8 KB (811 words) - 15:58, 15 December 2024
  • Offensive Security (category Digital forensics software)
    information security, penetration testing and digital forensics. Beginning around 2007, the company created open source projects, advanced security courses, the...
    23 KB (1,565 words) - 06:09, 23 April 2025
  • Thumbnail for List of academic fields
    Computational geometry Database Data science Data structures Computer architecture Computer communications (networks) Information theory Internet, World...
    77 KB (4,654 words) - 15:20, 22 May 2025
  • SANS Institute (category Computer security organizations)
    Advanced Incident Response, Threat Hunting, and Digital Forensics SEC275: Foundations: Computers, Technology, & Security SEC560: Enterprise Penetration...
    17 KB (1,559 words) - 10:52, 23 April 2025
  • Thumbnail for British Computer Society
    Information Systems Computer Arts Society Computer Conservation Society Configuration Management Consultancy Cybercrime Forensics Cybernetic Machine DCSG...
    30 KB (2,890 words) - 15:15, 10 March 2025
  • Parkerian Hexad (category Computer security)
    ISSN 2083-6473. Dardick, Glenn S. (2010). "Cyber Forensics Assurance". 8th Australian Digital Forensics Conference. Edith Cowan University: November 30th...
    10 KB (1,103 words) - 16:45, 25 May 2025
  • Georgios Magklaras (category Greek computer scientists)
    systems, digital forensics, bioinformatics, computer programming and systems administration. Magklaras gained his BSc (Hons) in Computer Systems and Networks...
    11 KB (1,340 words) - 16:10, 4 June 2024
  • Thumbnail for Server (computing)
    A server is a computer that provides information to other computers called "clients" on a computer network. This architecture is called the client–server...
    25 KB (2,307 words) - 19:25, 17 June 2025
  • Disk image (category Computer file formats)
    (ed.), "Vocabulary", Guide to Digital Forensics: A Concise and Practical Introduction, SpringerBriefs in Computer Science, Cham: Springer International...
    20 KB (2,289 words) - 19:20, 23 May 2025
  • Thumbnail for 3D modeling
    Computer-Aided Design in Architecture. Proceedings of the 26th Annual Conference of the Association for Computer-Aided Design in Architecture (ACADIA). ACADIA...
    28 KB (3,161 words) - 21:08, 17 June 2025
  • Thumbnail for Forensic software engineering
    during the migration/transition from an old datacenter to a newer one. Computer programming portal Charles Babbage Institute History of operating systems...
    1 KB (148 words) - 19:29, 26 March 2024
  • functions: The Forensic Authentication Microstructure Optical Set (FAMOS)."Proc. Proceedings of IEEE International Workshop on Information Forensics and Security...
    127 KB (7,858 words) - 19:24, 27 May 2025
  • Thumbnail for Career and technical education
    interior architect, naval architecture, packaging engineering, UX, UI. Artificial intelligence engineering – machine learning, computer vision, list of artificial...
    25 KB (1,452 words) - 16:31, 16 June 2025
  • year 2021. The Bangladesh Computer Council has been awarded "The Open Group President's Award" in the category of "Architecture Enabled Government Transformation"...
    52 KB (4,848 words) - 20:21, 25 March 2025
  • Global Information Assurance Certification (category Digital forensics certification)
    Institute of Advanced Technologies. GIAC provides a set of vendor-neutral computer security certifications linked to the training courses provided by the...
    11 KB (428 words) - 18:01, 17 January 2025
  • Journal of Digital Forensics, Security and Law. 12 (2). ISSN 1558-7215. Dana H. Ballard; Christopher M. Brown (1982). Computer Vision. Prentice Hall...
    215 KB (23,980 words) - 18:58, 14 June 2025
  • Thumbnail for Laboratory information management system
    work. "LIS" has tended to refer to laboratory informatics systems in the forensics and clinical markets, which often required special case management tools...
    22 KB (3,084 words) - 10:21, 5 March 2025
  • Collaboration Oriented Architecture (COA) is a computer system that is designed to collaborate, or use services, from systems that are outside of the operators...
    5 KB (534 words) - 10:35, 20 February 2023
  • April 2016). The Encyclopedia of Computer Security Exploits. ISBN 9781530944682. Britz, Marjie (2013). Computer Forensics and Cyber Crime (3 ed.). Pearson...
    18 KB (1,725 words) - 19:07, 26 March 2025
  • Engineering WG 2.10 on Software Architecture WG 2.11 Program Generation WG 2.12 Web Semantics (Joint with WG 12.14) WG 2.13 Open Source Software[usurped] WG...
    36 KB (4,167 words) - 06:40, 28 April 2025