- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 125字
- 2021-07-02 12:38:24
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "I usually specify the filename as an HTML file, such as test.html."
Any command-line input or output is written as follows:
apt-get install metagoofil
Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Go to Settings | Developer options and enable both the Advanced reboot and Android Debugging options."
Warnings or important notes appear like this.
Tips and tricks appear like this.
推薦閱讀
- 計(jì)算機(jī)使用安全與防護(hù)
- 工業(yè)物聯(lián)網(wǎng)安全
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)研究
- 網(wǎng)絡(luò)安全設(shè)計(jì)、配置與管理大全
- 情報(bào)驅(qū)動(dòng)應(yīng)急響應(yīng)
- Web安全之深度學(xué)習(xí)實(shí)戰(zhàn)
- 解密數(shù)據(jù)恢復(fù)
- 黑客攻防從入門(mén)到精通
- 信息技術(shù)基礎(chǔ):提高篇·實(shí)驗(yàn)與習(xí)題
- 網(wǎng)絡(luò)安全實(shí)戰(zhàn)詳解(企業(yè)專(zhuān)供版)
- 交換機(jī)·路由器·防火墻(第2版)
- 黑客攻防從入門(mén)到精通:命令版
- 網(wǎng)絡(luò)空間安全法律問(wèn)題研究
- 云計(jì)算安全技術(shù)與應(yīng)用
- 黑客攻防入門(mén)