Browse Definitions :

Resources

A career in information technology requires continuous learning. Whether you are diving into a new area of IT or are looking to earn free CPE credits online, we have the resources you'll need to make your next project successful and keep your IT certifications valid.

  • Book Chapters

    Browse through our list of free online computer science, engineering and programming textbooks excerpts and chapter downloads.

  • Buyer's Guides

    Need to determine which type of technology or vendor's product will help you solve your business problem? Use our buyer's guides to get up to speed quickly.

  • Certifications and Training

    Browse training resources, general information about IT certifications and practice questions for specific certification exams.

  • Cheat Sheets

    A cheat sheet is a quick look-up reference chart or set of simple, brief instructions for accomplishing a specific task.

  • Expert Advice

    Looking for real-world technology advice and education? Hear from industry veterans as they share their own best practices, perspectives and lessons learned across a range of topics.

  • Infographics

    Are you a visual learner? Browse these educational graphics and quickly get up to speed about a variety of IT-related topics.

  • Interview Questions & Answers

    Sample questions and answers to help you prepare for your next job interview.

  • Learning Guides

    Our topic-specific guides provide easy access to content we have about a particular niche topic. 

  • Quizzes

    Take a few minutes to test your knowledge about the vocabulary used in information technology or take a quiz about a particular niche area of expertise. A quiz is a great starting point for self-directed learning!

  • Tech Accelerator

    Tech Accelerator is a learning resource for cybersecurity, storage, AI, data analytics, DevOps, networking, customer experience management, HR, and related business topics.

  • Technology-specific sites

    We've created a useful landing page to help you navigate the TechTarget network of IT-specific sites. You'll want to bookmark this page and use it often.

  • Templates (free!)

    Why reinvent the wheel when there are free business templates you can use?

  • Writing for Business

    Is your grammar as good as your code? Quiz yourself on these common mistakes people make in Powerpoint presentations, business plans and other B2B documents and find out!

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • erasure coding

    Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant ...

Close