- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 185字
- 2021-06-24 16:38:55
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "Mount the downloaded WebStorm-10*.dmg disk image file as another disk in your system."
A block of code is set as follows:
html, body, #map {
height: 100%;
margin: 0;
padding: 0
}
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
[default]
exten => s,1,Dial(Zap/1|30)
exten => s,2,Voicemail(u100)
exten => s,102,Voicemail(b100)
exten => i,1,Voicemail(s0)
Any command-line input or output is written as follows:
$ mkdir css
$ cd css
Bold: Indicates a new term, an important word, or words that you see on screen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Select System info from the Administration panel."
- 信息安全導論(在線實驗+在線自測)
- 計算機網絡安全技術(第6版·慕課版)
- Mobile Forensics Cookbook
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 工業互聯網安全
- 安全實戰之滲透測試
- 軟件開發安全之道:概念、設計與實施
- 軟件安全保障體系架構
- Mastering Reverse Engineering
- Learn Azure Sentinel
- 數據中心安全防護技術
- 攜手構建網絡空間命運共同體
- 商用密碼與安全性評估
- INSTANT Citrix Security How-to
- Web滲透測試從新手到高手(微課超值版)