eBooks-it.org Logo
eBooks-IT.org Inner Image

Packt eBooks Page 75

Download free Packt eBooks Page 75

Learning Bing Maps API

Learning Bing Maps API Image
Obtain geographical data from Bing Maps and display them on the map Overview Display address information for any point on the map through the location-based REST services API Embed a map on a web page with a custom theme Geocode with Spatial Data APIs and display the information on the map In Detail Provided as a part of Microsoft's Bing suite of search engines, Bing Maps is a web mapping service powered by the Bing Maps for Enterprise framework. The need for geospatial data has increased dramatically in the last few years. Adding a mapping context to any location-based data is becoming more and more common, and businesses are embracing it to improve their user experience with new data richness. Comprising of simple, follow-along examples, Learnin...

Disaster Recovery using VMware vSphere Replication and vCenter Site Recovery Manager

Disaster Recovery using VMware vSphere Replication and vCenter Site Recovery Manager Image
Learn to deploy and use vSphere Replication 5.5 as a standalone disaster recovery solution and to orchestrate disaster recovery using vCenter Site Recovery Manager 5.5. Overview Learn how to deploy and use vSphere Replication as a standalone disaster recovery solution. Configure SRM to leverage array-based or vSphere replication engine. Use SRM to orchestrate the execution of recovery plans. In Detail VMware vCenter Site Recovery Manager automates disaster recovery in a manner that no other solution does. It is programmed to leverage array-based replication and VMware's proprietary vSphere Replication engine.This book will familiarize you with the concepts of disaster recovery using vCenter Site Recovery Manager and vSphere Replication.You will lea...

vSphere Design Best Practices

vSphere Design Best Practices Image
Apply industry-accepted best practices to design reliable high-performance datacenters for your business needs with this book and ebook. Overview Learn how to utilize the robust features of VMware to design, architect, and operate a virtual infrastructure using the VMware vSphere platform Customize your vSphere Infrastructure to fit your business needs with specific use-cases for live production environments Explore the vast opportunities available to fully leverage your virtualization infrastructure In Detail vSphere allows you to transform your IT infrastructure into a private cloud, then bridge it to public clouds on-demand, delivering an IT infrastructure as an easily accessible service. vSphere delivers uncompromised control over all IT resou...

Kali Linux CTF Blueprints

Kali Linux CTF Blueprints Image
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux Overview Put the skills of the experts to the test with these tough and customisable pentesting projects Develop each challenge to suit your specific training, testing, or client engagement needs Hone your skills, from wireless attacks to social engineering, without the need to access live systems In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge proj...

Mastering Kali Linux for Advanced Penetration Testing

Mastering Kali Linux for Advanced Penetration Testing Image
A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers Overview Conduct realistic and effective security tests on your network Demonstrate how key data systems are stealthily exploited, and learn how to identify attacks against your own systems Use hands-on techniques to take advantage of Kali Linux, the open source framework of security tools In Detail Mastering Kali Linux for Advanced Penetration Testing will teach you the kill chain perspective in assessing network security - from selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection. This book will take you, as a tester, through the reconnaissanc...



2007 - 2017 © eBooks-IT.org