Browse Definitions :

Cheat Sheets

A cheat sheet is a quick look-up reference chart or set of simple, brief instructions for accomplishing a specific task. Can't find the cheat sheet you're looking for? Let us know!

  • IP subnetting: How to calculate subnet masks

    Check out IP subnetting shortcuts on how to do subnet mask calculations and break down IP address classes to route traffic within your network.

  • SDN/NFV end-games, paths forward remain in flux

    In this week's blogs round-up, an analyst predicts that SDN/NFV will see decisive changes in 2016, while a blogger says open source SDN projects are gaining steam.

  • Fast Guide: Enterprise risk

    An enterprise risk is any potential event that could threaten an organization's ability to achieve its financial goals; long term, a risk can be a threat to sustainability. In a business context, risks are broadly categorized as either internal or external, or whether or not they are controllable by the organization. See our guide to types of enterprise risk.

  • Guide to iOS 7, OS X Mavericks and new Apple devices

    Apple devices and OSes are consumer favorites, but they also come with management tools and application features that IT can take advantage of.

  • XHTML Cheatsheet

    Cheat sheet quick look-up for XHTML.

  • Cheat sheet: Talking to clients about cloud computing security risks

    Customers are jumpy about cloud computing security risks, and cloud providers must be ready for their questions with bulletproof answers. Here are questions you can expect.

  • Cheat Sheets and Quick Reference Guides

    A handy collection of thing you may need to look up frequently.

  • XSS cheat sheet: How to prevent XSS attacks and detect exploits

    Cross-site scripting (XSS) attacks are constantly top-of-mind for enterprise security professionals, and for good reason: They can do a great deal of damage. In this XSS cheat sheet guide, security professionals will receive advice on how to prevent XSS attacks and detect exploits.

  • AS/400 Cheat Sheets

    A collection of AS/400 cheat sheets with information about AS/400 and iSeries topics.

  • Delphi Cheat Sheets

    We've gathered cheat sheets for fast reference to information about Delphi. You'll find information about variables, array types, execution and flow control and more. Need more background information before you get started? See our definitions for Delphi, object-oriented programming (OOP) and Web services.

  • ColdFusion Cheat Sheets

    We've gathered cheat sheets for fast reference to ColdFusion-related information. You'll find information about statements, functions, comments and more. Need more background information before you get started? See our definitions for ColdFusion, integrated development environment (IDE) and ColdFusion Markup Language (CFML).

  • C, C# and C++ Cheat Sheets

    We've gathered cheat sheets for fast reference to C-related information. You'll find information about C, structured programming, object-oriented programming and more. Need more background information before you get started? See our definitions for C, C++, C# and VB.NET.

  • Bash Cheat Sheets

    We've gathered cheat sheets for fast reference to Bash-related information. You'll find information about shell scripting, variables, functions, emacs and more. Need more background information before you get started? See our definitions for shell, Bash, Bourne shell and Emacs.

  • Active Server Pages (ASP) Cheat Sheets

    We've gathered cheat sheets for fast reference to Active Server Pages (ASP)-related information. You'll find information about functions, syntax, expressions, collections and more.

  • Apache Cheat Sheets

    We've gathered cheat sheets for fast reference to Apache-related information. You'll find information about server includes, commands, tips and tricks and more.

  • Ajax Cheat Sheets

    We've gathered cheat sheets for fast reference to Ajax-related information. You'll find information about Prototype, code packages, scriptaculous and more.

  • ADA Cheat Sheets

    We've gathered cheat sheets for fast reference to information about the ADA programming language. You'll find information about declarations, expressions, translation to other languages, the library and more.

  • ActionScript Cheat Sheets

    We've gathered cheat sheets for fast reference to ActionScript-related information. You'll find information about functions, properties, classes and more.

  • Human Resources Cheat Sheets

    We've gathered resources from around the Web to help you handle tricky human resources-related tasks, like interviewing and evaluating prospective employees. You'll find cheat sheets that show you how to communicate effectively and how deal with problematic people -- among other resources.

  • Search Engine Cheat Sheets

    We've gathered cheat sheets for fast reference to search engine-related information. You'll find cheat sheets listing queries, specialized engines, computational tips and more.

  • Windows Cheat Sheets

    We've gathered cheat sheets for fast reference to Windows information. You'll find cheat sheets listing commands, keyboard shortcuts, admin tips and more.

  • Unix Cheat Sheets

    We've gathered cheat sheets for fast reference to Unix-related information. You'll find cheat sheets listing commands, keyboard shortcuts and more.

  • Linux Cheat Sheets

    We've gathered cheat sheets for fast reference to Linux-related information. You'll find cheat sheets listing commands, keyboard shortcuts and more.

  • DOS Cheat Sheets

    Although you may not use it on a daily basis, DOS can be very handy from time to time. We've gathered cheat sheets for fast reference to DOS.

  • Networking Cheat Sheets

    We've gathered our cheat sheets for fast reference to networking technology information. You'll find cheat sheets listing specifications, cabling information and more.

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • reverse brute-force attack

    A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple ...

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • primary storage (main storage)

    Primary storage is the collective methods and technologies used to capture and retain digital information that is in active use ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close