- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 104字
- 2021-06-30 19:15:44
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "Mount the downloaded WebStorm-10*.dmg disk image file as another disk in your system."
Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Select System info from the Administration panel."
Warnings or important notes appear like this.
Tips and tricks appear like this.
推薦閱讀
- Learning Windows Server Containers
- Linux內核完全注釋(20周年版·第2版)
- Learning Android Intents
- VMware Horizon View 6 Desktop Virtualization Cookbook
- 構建可擴展分布式系統:方法與實踐
- Ganglia系統監控
- 細說Linux基礎知識
- Mastering Reactive JavaScript
- Kali Linux高級滲透測試(原書第3版)
- Windows 7使用詳解(修訂版)
- Building Telephony Systems With Asterisk
- Linux應用大全 基礎與管理
- 完美應用Ubuntu(第2版)
- Linux內核修煉之道
- Hadoop Operations and Cluster Management Cookbook