Browse Definitions :

Learning Guides

A TechTarget learning guide is an educational tool for a self-directed adult learner who works with information technology. Can't find a guide for the subject you need to learn more about? Let us know!

  • How to install VMware on Windows Server 2003 - Fast guide

    Installing new software can be difficult, especially with a new technology. Enter VMware expert Andrew Kutz. In this fast guide, he details every part of installing VMware Server on Windows in layman's terms.

  • Active Directory security school: Maintenance and testing

    This is lesson three of our Active Directory security school.

  • Fast Guide: Active Directory security

    Windows Active Directory has become one of the key components to enterprise management

  • Crash Course: Oracle basics

    This crash course will bring you up to speed on Oracle DBMS basics for versions 8.x through 9.x, and provide you with an overview of Oracle10g's new tools and features.

  • Fast Guide: Avoiding data integrity gotchas

    You may perform a number of tasks for data integrity's sake, assuring that data can only be accessed or modified by those authorized to do so. Yet improperly performing such tasks can harm your data. This fast guide offers tips and tricks to ensure and maintain data integrity, with a particular focus on avoiding the "gotchas" that can compromise your data.

  • RAID fast guide

    You need info about RAID. It's that simple. In the world of storage, RAID (redundant array of independent disks) is a major topic. Whether you are a RAID rookie or you're trying to optimize performance of a huge array, you'll learn something here. This Fast Guide offers RAID news, expert technical advice and tips.

  • Relational Database Management System (RDBMS) fundamentals tutorial

    New to database administration or development? Here's a quick guide that can get you started by providing background on the relational model and practical advice for working with a relational database management system.

  • Fast Guide: Storage basics

    Storage covers a lot of territory and it can be overwhelming for the beginner. In our Fast Guide: Storage basics, we break it down into categories -- and keep it simple. We start out with basic storage terms, then go on to management, networking and primary storage. Keep this Guide handy and it will provide you with what you need to know for a good storage foundation.

  • SQL guide for Oracle users

    Whether you are a newbie or a seasoned expert looking to tweak query performance, this learning guide to the structured query language (SQL) has something for you. These seven chapters can help you figure out how to get the data you need by looking at solutions to real-world problems.

  • Bits & Bytes column library archive

    Bits & Bytes column library archive -- 2003 to 2004

  • Learning Guide: SAN management

    Managing your SANs has always been challenging. So, to help you along with the process we've assembled arguably the most comprehensive listing of the SAN management tools and resources on the Web -- the "Learning Guide to SAN management". Take a look here for advice, tips and articles on tools, techniques and concepts that will help you plan a SAN, increase utilization and keep your networks running 24/7.

  • Fast guide to RPG IV resources and Redbooks

    Need information fast on RPG IV? Take a look at these resources. We've found Redbooks, training and FAQs for everyone from novice users to experienced pros.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close