Brain Dump
Hi there, I'm mohkale and you've stumbled upon my brain-dump. This website contains my working notes accumulated starting from my last year at university (July 2020). I write notes using the excellent org-roam package and export them to markdown through ox-hugo which then renders them on this blog.
I'm still waiting on some up-stream improvements to ox-hugo and org so there are several issues with the current state of these notes. The main issues at the time of writing are:
- Several latex fields are rendered literally as code blocks. This isn't intentional and ideally such blocks should either be exported as is or rendered into an image instead. I plan to fix this but due to a bug in orgs latex-babel export I'm unable to proceed.
To finish I'd just like to give a huge thanks to Jethro Kuan. His creation of org-roam and demonstration of an org-based personal knowledge management system that can be exported to both the web, latex or pdf was a profound influence on the creation of this brain-dump.
- 3-Tier Architecture
- 3D Representations
- 3D Texture Mapping
- 4-Tier Architecture
- 4th Generation Languages
- 5th Generation Languages
- Absorption Costing
- Abstract Class
- Abstract Factory Pattern
- Acceptance
- Acceptance Criteria
- Acceptance Tests
- Access Control
- Access Control Matrix Model
- Access Control Model
- Accounting
- ACID
- Acid Test Ratio
- Acoustic Echo
- Acoustic Echo Canceler
- Acoustic Phonetics
- Activity Diagram
- Actor
- Acyclic Graph
- Adaptive Filter
- Adaptive Intelligence
- Adaptive Modelling
- Adaptive Tree Depth Control
- Address Space Layout Randomisation
- Adjacency List
- Adjacency Matrix
- Adjoint Matrix
- Advanced Ray Tracing
- Agent
- Agent Function
- Agent Program
- Aggregation
- Agile Software Development
- Algebra
- Algorithm
- Alice and Bob
- Allophone
- Amplitude Quantisation
- Animation
- Anti Aliasing
- Anti Hebbian Rules
- Anti-Forensics
- Anti-Symmetric Relation
- AP-Algorithm
- Approximation
- Arbitration
- Arithmetic Coding
- Arithmetic Series
- Arrays as Trees
- Articulators
- Articulatory Phonetics
- Artificial Intelligence
- Artificial Neurons
- Ascii
- Assembly
- Assembly Languages
- Assets
- Association
- Asymmetric Relation
- Asymmetric-key Encryption
- Asymptotic Notation
- Atomic Operations
- Attenuation
- Audit
- Auditory Pathways
- Authentication
- Authorisation
- Autocorrelation Function
- Autoprobing
- Availability
- Availability
- AVL Trees
- B+ Tree
- Back Propagation
- Backdoor
- Bag of words
- Baiting
- Band Analysis
- Barrier
- Batch
- Batch Gradient Descent
- Bayes Classifier
- BCM Rule
- Behavioural State Machine
- Bellman Equation
- Bernstein Blending Function
- BERT
- Bezier Curves
- Big-O Notation
- Bijection
- Billboard
- Bin Packing
- Binary Buddy Allocator
- Binary Function
- Binary Lexicon
- Binary Relation
- Binary Search
- Binary Search Tree
- Binary Tree
- Bing-Liu Model
- Binomial Theorem
- Biometrics
- BIOS
- Bipartite Graph
- Biquad Filter
- Bit
- Bitcoin
- BitTorrent
- Bitwise Agreement
- Block Cipher
- Block Cipher Modes of Use
- Block Device
- Block Processing
- Boehm's First Law
- Boolean Algebra
- Boolean Retrieval
- Boot Loader
- Boot Manager
- Booting
- Bounding Volumes
- Box Plots
- Breach of Conduct Remedies
- Breadth First Search
- Break Even Analysis
- Break Even Chart
- Brickwall Filter
- Bridge Pattern
- BSD
- Bubble Sort
- Buffer Overflow
- Bump Mapping
- Business Finance
- Byte
- C
- Caesar Cipher
- Camera
- CAP
- CAPEC
- Capital Investment Appraisal
- Capital Rationing
- Cardinal Vowel
- Cartesian Product
- Cepstral Analysis
- Certainty
- Certifying Authority
- CGI
- Chain Loading
- Chain of Custody
- Chain of Responsibility
- Channel
- Characters & Glyphs
- Cieling
- Cipher
- Cipher Block Chaining
- Cipher Feedback Mode
- Circle
- Civil Law
- Class Diagram
- Classification
- Click Thru
- Clickjacking
- Clone
- Clustering
- CMake
- Co-Domain
- Coarticulation
- Cochlea
- Code Metrics
- Code Segment
- Code Synchronisation
- Codebook
- Coding Theory
- Coffman Conditions
- Cognitive Science
- Cohesion
- Collection Period
- Color Mapping
- Command Pattern
- Commercial Constraints
- Common Cost Model
- Comparison Sorts
- Competitive Neural Network
- Compiled Language
- Complete Graph
- Complete Matching
- Completing the Square
- Complex Numbers
- Component
- Component Based Development
- Composite Cipher
- Composite Number
- Composite Pattern
- Composition
- Compound Key
- Compression Entropy
- Compression Model
- Compression Random Access
- Computer
- Computer Bus
- Computer Graphics
- Computer Network
- Computer Security & Forensics
- Computer Virus
- Computer Worm
- Condition Variables
- Confidentiality
- Confusion Matrix
- Connected Graph
- Consideration
- Consistency
- Consistent Hashing
- Consonant
- Constraint
- Constructive Solid Geometry
- Containers
- Continuants
- Continuous Bag of Words
- Continuous Integration
- Continuous Word Representations
- Contract Dischargement
- Contract Law
- Contract vs. Tort
- Contradiction
- Control Theory
- Controller Card
- Convergence
- Convolution
- Convolutional Filter
- Convolutional Neural Network
- Convoy Effect
- Coordinate Systems
- Coprime
- Copy Elision
- Coreference Resolution
- Correlation
- Correlation Attack
- Correlation Matrix
- Cosine Correlation
- Cost
- Counter Mode
- Counting Sort
- Coupling
- Covariance Matrix
- Covert Channels
- CPP
- CPU
- Crawling
- CRC Card Prototyping
- Criminal Law
- Cryptanalysis
- Cryptographic System
- Cryptography
- Cubic Equation
- Culling
- Cumulative Distribution Function
- Curse of Dimensionality
- CVC Sequence
- Cyber Crime
- Cybernetics
- Cycle
- Cylinder Head Sector
- Daemon
- Data Destruction
- Data Encryption Standard
- Data Hiding
- Data Normalisation
- Data Segment
- Data Space
- Data Structure
- Database Denormalisation
- Database Normal Forms
- Database Normalisation
- Database Optimisation
- Database Replication
- Database System
- DBMS
- Deadlock
- Decibels
- Decision Boundary
- Decision Making
- Declarative Languages
- Deduction
- Deep Feed-Forward Neural Network
- Deep Reinforcement Learning
- Demand
- Denary
- Dense Graph
- Deployment Diagram
- Depth First Search
- Derivatives
- Design Metrics
- Design Pattern
- Detecting Light Intersection
- Determinant
- Deterministic Algorithm
- Diagonalisation
- Diagram Coding
- Dictionary Text Compression
- Difference Equation
- Differential Cryptanalysis
- Differential Equation
- Diffuse Maps
- Digital Circuits
- Digital Evidence
- Digital Forensics
- Digital Image
- Digital Rights Management
- Digital Signals
- Digital to Analogue
- Digraph
- Dijkstra's Algorithm
- Dipthongs
- Directional Light
- Directory
- Discontinue Decision
- Discrete Cosine Transform
- Discrete Log Problem
- Discrete Random Variables
- Discrete Uniform Distribution
- Discretionary Access Control
- Disjoint Sets
- Disk Block
- Disk Memory
- Displacement Mapping
- Distributed System
- Divide & Conquer
- Dividend
- Docker
- Docker Compose
- Domain
- Domain
- Domain Name
- Domain Name System
- Dot Product
- Double Entry Concept
- Drawing a Triangle
- Drawing Methods
- Duty of Care
- Dynamic Programming
- Dynamic Security Testing
- Dynamic Set
- Dynamical Stability
- Echo-Return-Loss-Enhancement
- EEPROM
- Eigenvector
- Electroglottograph
- Electrolarynx
- Electronic Code Book
- Element Buffer Objects
- Elementary Row Operations
- Encapsulation
- Encoding
- Encryption
- End Point Detection
- Endianness
- Enigma Machine
- Entity Relationship Model
- Entity Relationship Modelling
- Environment Mapping
- Environmental Law
- Epic
- Epoch
- EPROM
- Epsilon-Greedy Reward Policy
- Equity
- Equivalence Class
- Equivalence Relation
- Euclid's Algorithm
- Euclidean Distance
- Euler Angles
- Eulerian Graph
- Eulers Formula
- Eulers Theorem
- Eulers Totient Function
- Event Extraction
- Everything is a File
- Excitation
- Excitory Post Synaptic Potential
- Exec
- Existential Quantification
- Expert Systems
- Exponent
- Exponential Moving Average
- External Cache
- External Constraints
- External Fragmentation
- Extreme Programming
- Facial Animation
- Factual vs. Subjective Data
- Fail Over
- Fake Shadows
- fcntl
- Feature Extraction
- Feature Selection
- Feature Space
- Feistel Cipher
- Fibonacci Numbers
- File
- File Carving
- File Description
- File Descriptor
- File Signatures
- File System
- Filter
- Filter Approximation
- Filter Coefficients
- Filter Model of Speech
- Filter Order
- Financial Statements
- Fingerprint Authentication
- Finite Context Model
- Finite Impulse Response Filter
- Firmware
- First-Come-First-Served Scheduler
- Flashlight
- Flat Shading
- Flaws vs. Vulnerabilities
- Floating Point
- Floor
- Flow Chart
- Foreign Key
- Forensic Tools
- Fork
- Fork Bomb
- Fork-Exec-Wait Pattern
- Formal Systems Development
- Formant
- Fountain Lifecycle
- Fourier Series
- Fourier Theorem
- Fourier Transform
- Fragments
- Frame
- Frame
- Frequency
- Frequency Analysis
- Frequency Domain
- Frequency-Analysis Attack
- FTP
- Function
- Function Composition
- Function Graph
- Function Image
- Function Points
- Function Pre-Image
- Function Representation
- Functions as Relations
- Fundamental Frequency
- Fundamental Theorem of Arithmetic
- FURPS
- Fuzzing
- Gearing
- Geffe Generator
- General Adversarial Network
- General Digital Filter
- Geometric Series
- Geometric Shadows
- Gimbal Lock
- Global Illumination
- Golang
- Gouraud Interpolative Shading
- Government Securities
- Gradable Lexicon
- Gradient Algorithm
- Gradient Descent
- Gram-Schmidt Process
- Grandmother Cell
- Graph
- Graph Transformations
- Graphics Pipeline
- Greatest Common Divisor
- Greedy Algorithms
- Greedy Reward Policy
- GTest
- GUID Partition Table
- Hamming Window
- Hands Free System
- Happy Flow
- Hard Disk
- Hard Link
- Hardware Interrupt
- Harmonic Trig Form
- Harmonics
- Heap
- Hearing
- Hearing Resolution
- Hebbian Constant Decay Rule
- Hebbian Learning
- Hebbian Post-synaptically Gated Rule
- Hebbian Rule
- Hebbian Synaptically Gated Rule
- Hebbs Postulum
- Heterogeneous Relation
- Heuristic Atmospheric Attenutation
- Hexal
- Hidden Surface Removal
- Hierarchial Design
- High Level Animation
- Higher Level Languages
- Histogram
- hledger
- Homogeneous Relation
- Homomorphic Filtering
- Host
- HSTS
- HTTP
- HTTPS
- Huffman Coding
- Human Voice Synthesis
- Hyperbola
- Hyperthreading
- i-node
- IAAA
- Idempotence
- Identification
- Identity Matrix
- Illumination
- Imaginary Constant
- Imaginary Number
- Imperative Languages
- Implementation
- Implicit Differentiation
- Implicit Function
- Impulse Response
- In-place Algorithm
- Income Statement
- Incremental Waterfall
- Indexing
- Inequalities
- Infinite Impulse Response Filter
- Inflexion Point
- Information Extraction
- Information Hiding
- Information Modelling
- Information Retrieval
- Information Retrieval Evaluation
- Init
- Injection
- inode
- Insertion Sort
- Integer
- Integration
- Integration Platform as a Service
- Integrity
- Intellectual Property
- Intelligent Agents
- Intention
- Inter-Process Communication
- Internal Cache
- Internal Fragmentation
- Internet
- Interpolative Shading
- Interpreted Language
- Interrupt
- Interrupt Request
- Invention Protection
- Inventory Holding Period
- Inverse Fourier Transform
- Inverse Function
- Inverse Matrix
- INVEST
- Investment
- Invitation to Tender
- IP
- IP Address
- IP Infringement
- IPA
- IR vs. IE
- Irreflexive Relation
- ISA
- Iterative Design Model
- Journal
- K-Means Clustering
- Kanban Board
- Kernel
- Kernel Ring
- Key Agreement Protocol
- Keyed-Stream Cipher
- Kinds of Intelligence
- KISS
- Kronecker Delta
- Kruskal's Algorithm
- Laplace Smoothing
- Latency vs. Throughput
- Law
- Law of Confidential Information
- Law of Copyright
- Layered Architecture
- Learning Algorithms
- Learning Curve
- Leasing
- Least Common Multiple
- Least Squares Regression Line
- Lexicon
- Liabilities
- Life Cycle Analysis
- Limited Company
- Linear Cryptanalysis
- Linear Expressions
- Linear Feedback Function
- Linear Feedback Shift Registers
- Linear Filters
- Linear Prediction
- Linear Programming
- Linear Relations
- Linear Time Sorting
- Linear Transformations
- Lines of Code
- Linked List
- Linux
- Linux Forensics
- Liquidity
- Little Omega Notation
- Little-O Notation
- LMS-Algorithm
- Load Balancer
- Loans
- Localhost
- Locality
- Locus
- Logarithms
- Logical Block Addressing
- Logical Constraints
- Logistic AI
- London Stock Exchange
- Long Term Scheduling
- Loop Invariant
- Low Level Animation
- LRU Cache
- Machine Language
- Main Memory
- Make or Buy
- Malleus, Incus, Stapes
- Malware
- man
- Man in the Middle Attack
- Mandatory Access Control
- Margin of Safety
- Marginal Cost
- Marginal Costing
- Market Price
- Market Theory
- Markovian Decision Process
- Masking
- Master Boot Record
- Matching
- Matrix
- Matrix Transformations
- Max Heap
- Max-Heap Sort
- Maximal Matching
- McCabe Metrics
- Meatus
- Mediator Pattern
- Medium Level Animation
- Medium Term Scheduling
- Mel Frequency
- Memoization
- Memory
- Memory Allocation
- Memory Management
- Memory Safety
- Memory Translation
- Merge Sort
- Metric Pairwise K-Means Clustering
- Microphone
- Microservice
- Min Heap
- Min-Max Transformation
- Mini-Batch Gradient Descent
- Minimal Hebbian Rule
- Minimal Pairs
- Minimum Spanning Tree
- Mipmaps
- mmap
- MMU
- Mobile Forensics
- Mode, Median, Modal
- Model-Delegate
- Model-View-Controller
- Modular Arithmetic
- Modular Protection
- Modulus
- Modulus Function
- Moire Patterns
- Mono-alphabetic Substitution Cipher
- Monopthongs
- Monotonic Function
- Moral Rights
- Mosaicing
- MOSCOW Method
- Most Vexing Parse
- Motherboard
- Motion Capture
- Mount Points
- Moving Weighted Average
- Multi Level Security
- Multi Sampling
- Multi-factor Authentication
- Multitasking
- Mutex
- MVP-Matrix
- N-Ary Relations
- Naive Bayes Classifier
- Naive Ray Tracing
- Name Entity Recognition
- Name Server
- Natural Frequency
- Negligence
- Net Asset Turnover
- Network Certificate
- Network Interface
- Network Protocol
- Neural Network
- Neural Spike Rate
- Neuron
- Next Generation Access Control
- Nibble
- NLMS-algorithm
- No-Write-Down, No-Read-Up Policy
- Node Valency
- Noise
- Noise Reduction
- Non-interference
- Non-Stationary Sounds
- NordVPN
- Normal Distribution
- Normal Mapping
- Normal Matrix
- Normalised Device Coordinates
- Notch Filter
- NTP
- Nuisance
- Number Notation
- Numbers
- Numeric Intervals
- Numerical Methods
- Nyquist-Shannon Theorem
- Object
- Object Constraint Language
- Object Diagram
- Object Oriented Programming
- Observer Pattern
- Octal
- Offer
- Oja's Rule
- Omega Notation
- One-to-One Function
- OpenGL
- Operating Cycle
- Operating System
- Opinion Mining
- Opportunity Cost
- Optimal Substructure
- Optimistic-Greedy Reward Policy
- Orphan Process
- OS Forensics
- OSI Model
- Out-of-Order Execution
- Output Feedback Mode
- Overdraft
- P-box
- P-code Language
- Package Diagram
- Packet
- Page
- Page Fault
- Page Files
- Page Rank
- Page Table
- Pair Programming
- Pairwise Constrained K-Means Clustering
- Parabola
- Parametric Curves
- Parametric Function
- Parametric Patches
- Partial Fractions
- Partial Function
- Partial Order Reflection
- Partition
- Partitioned Architecture
- Patent
- Path
- Path Tracing
- Pattern Attack
- Payment Period
- PCI
- PCMCIA
- Penetration Testing
- Percept
- Percept Sequence
- Perfect Forward Secrecy
- Peri Stimulus Time Histogram
- Permutation Cipher
- Perspective Projection
- Phase Shift
- Philosophy in AI
- Phising
- Phonation
- Phone
- Phoneme
- Phonemics
- Phonetic Writing Systems
- Phonetics
- Phong Illumination
- Phong Interpolative Shading
- Phonological Process
- Phonology
- Physical Constraints
- Piling Up Lemma
- Pipelined Architecture
- Pipes
- Pitch
- Plain-text Attack
- Plasticity
- Point Light
- Pointers
- Poles & Zeros
- Poly-alphabetic Substitution Cipher
- Polygon
- Polygon Mesh
- Port
- Post-Synaptic Neurons
- Power Spectrum
- Powerset
- Pre-Synaptic Neurons
- Predicate
- Prediction by Partial Matching
- Predictive Design Models
- Preemptive Shortest-Job-First Scheduler
- Pretexting
- Price & Demand
- Prim's Algorithm
- Primary Key
- Prime Number
- Principle Component Analysis
- Principle of Modularity
- Priority Queue
- Probability
- Probability Density Function
- Probability Distribution
- Probability Tree Diagram
- Process
- Process Heap
- Process Stack
- Processor Caching
- Processor Registers
- Product
- Profit Margins
- Profit Volume Graph
- Profit vs. Cash
- Program
- Program Break
- Programming Language
- Proof by Contradiction
- Proof by Induction
- Proper Subsets
- Propositional Variables
- Propositions
- Prosody
- Protocol State Machine
- Prototype Model
- Proxy
- Pseudo Relevance Feedback
- Psuedo-random Number Generator
- Public Key Cryptography
- Public or Private Law
- Pure Tone
- Pytest
- Python
- Q-learning
- Q-values
- Quadrant
- Quadratic Equation
- Quantifications
- Quantisation
- Quefrency Domain
- Query Expansion
- Query Logs
- Queues
- Quick Sort
- Quotient Remainder Theorem
- Race Condition
- Radians
- Radix Sort
- RAID
- Random Access Model
- Random Algorithms
- Range
- Ranked Algorithms
- Ratio Analysis
- Rational Agent
- Rationality
- Ray Box Intersection
- Ray Casting
- Ray Plane Intersection
- Ray Polygon Intersection
- Ray Sphere Intersection
- Ray Tracing
- Reactive Systems
- Reader Writer Problem
- Reason
- Receptive Field
- Recession
- Rectangular Hyperbola
- Recurrence Relation
- Recursive Definition
- Reducing the Footprint
- Refactoring
- Reflexive Relation
- Reinforcement Learning
- Reinforcement Neural Network
- Relation Composition
- Relation Extraction
- Relational Database
- Relative Refactory Period
- Relevance Feedback
- Remainder Theorem
- Remote Procedure Call
- Requirements Analysis
- Requirements Engineering
- Resonance
- Resource Allocation Graph
- REST
- Return on Capital Employed
- Reverberation
- Reward Policy
- Ring Buffer
- Rod Cutting Problem
- Rogue
- Rogue Certificate
- Role Based Access Control
- ROM
- ROT13
- Rotoscoping
- Round Robin Scheduler
- Route Inspection Problem
- Router
- RPM
- RSA
- Runtime Performance
- Runtime Recurrence Relations
- S-box
- S-Plane
- Sampling
- Sampling
- SARSA Algorithm
- Sashimi Waterfall
- Saturation
- Scalability
- Scatter Diagram
- Scenario
- Scene Graph
- Scheduler
- Scheduling
- Scintillation
- Screen Extents
- SCRUM
- Search Algorithm
- Sector and Segment
- Secure SDLC
- Securities
- Security Attack
- Security Constraints
- Security Protocol
- Security Services
- Security System
- Segmental Analysis
- Segregated Allocator
- Self Balancing Trees
- Semantic Web
- Semantics
- Semaphore
- Semi-Circle
- Semi-supervised Learning
- Sentiment Analysis
- Sentiment Classification
- Sentiment Summary
- Sequence Diagram
- Sequence Points
- Service
- Session Key
- Set Complement
- Set Difference
- Set Intersection
- Set Union
- Sets
- Shader
- Shader Program
- Shadow Volumes
- Shadow Zbuffer
- Shadows
- Shell
- Short Term Scheduling
- Short Time Energy
- Shortest-Job-First Scheduler
- Shoulder Surfing
- Sieve of Eratosthenes
- Signal
- Signal
- Signal Correlation
- Signal Processing
- Simultaneous Equations
- Sine Correlation
- Single Layer Feed-Forward Neural Network
- Single-factor Authentication
- Singular Matrix
- Skip Gram
- Skybox
- Slack Space
- SLD
- Smoothing Kernel
- SMTP Protocol
- Social Constraints
- Social Engineering
- Socket
- Soft Link
- Soft Tokens
- Soft-Max Reward Policy
- Software Architect
- Software Architecture
- Software Development Life Cycle
- Software Engineering
- Software Metrics And Estimations
- Software Safety
- Software Security
- Software Security Testing
- Software System
- Software Testing
- SohCahToa
- Solid State Drive
- Solid Texture Mapping
- Solvency Analysis
- Sorting Algorithm
- Sound
- Sound Pressure Level
- Source Filter Model
- Space Subdivision
- Spanning Tree
- Sparse Graph
- Spatial Partitioning
- Speaking
- Special Pricing Decisions
- Specification
- Spectra
- Spectral Analysis
- Spectral Leakage
- Spectre
- Spectrogram
- Specular Lobe
- Specular Mapping
- Speech
- Speech Frames
- Speech Processing
- Speech Segmentation
- Spiral Model
- Spoofing
- Spotlight
- SQL
- SQL Injection
- SSH
- SSL
- Stable Sort
- Stack
- Stack Protectors
- Stack Smashing
- Standardisation
- Standing Wave
- Starvation
- stat
- State Based Design
- State Machine Diagram
- State Pattern
- Statement of Cash Flows
- Statement of Financial Position
- Static Code Analysis
- Static Modelling
- Stationary Assumption
- Stationary Point
- Stationary Signals
- Statutory Defences
- Steganography
- Sticky Note
- Stochastic Gradient Descent
- Stochastic Ray Tracing
- Stochastic Sampling
- Stoplist
- Story Cards
- Straight Line
- Stream Cipher
- Stream Generator
- STRIDE
- Strong AI
- Sub-Graph
- Subject
- Subjectivity Analysis
- Subjectivity Classification
- Subsets
- Substitution Cipher
- Substitution Permuation Cipher
- Substitution Permuation Network
- Summation
- Sunk Cost
- Super Sampling
- Superblock
- Superposition
- Supervised Classifier
- Supervised Learning
- Surds
- Surjection
- Swap
- Switch
- Syllable
- Symbolwise Text Compression
- Symmetric Relation
- Symmetric-key Encryption
- sync
- Syntax
- System
- System Boundary
- System Design Interview
- Table Diagram
- Tail Call Optimisation
- Tap Sequence
- Target Costing
- Tautalogy
- TBN-space
- TCP
- Template Method Pattern
- Term Manipulation
- Term Weighting
- Test Coverage
- Text Coding
- Text Compression
- Text Processing
- Text Segment
- Texture Atlas
- Texture Filtering
- Texture Mapping
- Texture Unit
- Textures
- The Iron Triangle
- The Painters Algorithm
- The Web
- Theta Notation
- Thin Skull Rule
- Thrashing
- Thread
- Thread Safety
- Threat Modelling
- Threat Tree
- Timbre
- Time Domain Filtering
- Time Invariant Filter
- Time Value of Money
- Timesharing
- TLD
- TLS
- Topic Detection
- Topological Sorting
- Tort
- Total Function
- Total Order Reflection
- Total Turing Test
- Trademark
- Transform Centre Architecture
- Transitive Relation
- Translation Lookaside Buffer
- Trapezium Rule
- Travelling Salesman Problem
- Traversable Network
- Tree
- Tree Traversal
- Trespass
- Triangle
- Trigonometric Functions
- Trivial File Transfer Protocol
- Trojan Horse
- Trusted Computer Base
- Tube Harmonics
- Turing Test
- Type Safety
- UDP
- Umbra & Penumbra
- UML
- UML Constraints
- Unallocated Space
- Unary Relation
- Unicode
- Unique Quantification
- Universal Quantification
- Universe Set
- Unliquidated Damages
- Unsupervised Learning
- URL
- Use Case Diagram
- Use Cases
- User Interface Design
- User Story Points
- V-Model
- Valence
- Validation
- Value Based Pricing
- Variable Cost
- Variable Length Coding
- Variance
- Variant Flow
- Vector
- Vector Space Model
- Venn Diagram
- Venture Capital
- Verification
- Vernam Cipher
- Vertex Array Object
- Vertex Attributes
- Vertex Buffer Objects
- Vertex Normal
- Vertex Projection
- View Volume
- Virtual Disk Memory
- Virtual Machine
- Virtual Memory
- Visible Surface Ray Tracing
- Vocal Cords
- Vocal Tract
- Vocoder
- Voice Onset Time
- Volume Boot Record
- Von-Hann Window
- von-Neumann Architecture
- Vowels
- Waterfall Model
- Waterfall with Feedback
- Wavelength
- Weak AI
- Web App Security
- Web Services Pipeline
- Weighted Graph
- White Noise
- Windowing
- Windows Forensics
- Windows Registry
- Word Size
- Working Capital
- Writing Systems
- Xft
- XOR
- Xorg
- XSS
- Yellow Key
- Z-Plane
- Z-Plane Transfer Function
- Z-Transform
- Zbuffer
- Zero Crossing Rate
- Zero Order Model
- Zombie Process
- Zone Indexes