- Mastering Linux Security and Hardening
- Donald A. Tevault
- 163字
- 2021-07-02 19:19:16
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "let's use getfacl to see if we have any Access Control Lists already set on the acl_demo.txt file."
A block of code is set as follows:
[base]
name=CentOS-$releasever - Base
mirrorlist=http://mirrorlist.centos.org/?
release=$releasever&arch=$basearch&repo=os&infra=$infra
#baseurl=http://mirror.centos.org/centos/
$releasever/os/$basearch/
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-7
priority=1
Any command-line input or output is written as follows:
[donnie@localhost ~]$ tar cJvf new_perm_dir_backup.tar.xz new_perm_dir/ --acls
new_perm_dir/
new_perm_dir/new_file.txt
[donnie@localhost ~]$
Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Click the Network menu item, and change the Attached to setting from NAT to Bridged Adapter."
Warnings or important notes appear like this.
Tips and tricks appear like this.
- Node Security
- unidbg逆向工程:原理與實(shí)踐
- 工業(yè)互聯(lián)網(wǎng)安全
- Metasploit Penetration Testing Cookbook(Second Edition)
- 特種木馬防御與檢測(cè)技術(shù)研究
- Enterprise Cloud Security and Governance
- 安全技術(shù)運(yùn)營(yíng):方法與實(shí)踐
- 數(shù)據(jù)安全與隱私計(jì)算(第3版)
- 網(wǎng)絡(luò)安全設(shè)計(jì)、配置與管理大全
- 網(wǎng)絡(luò)安全應(yīng)急響應(yīng)實(shí)戰(zhàn)
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實(shí)踐
- 先進(jìn)云安全研究與實(shí)踐
- Mastering Malware Analysis
- 網(wǎng)絡(luò)空間安全導(dǎo)論
- 計(jì)算機(jī)系統(tǒng)與網(wǎng)絡(luò)安全研究