- Mobile Forensics Cookbook
- Igor Mikhaylov
- 153字
- 2021-07-02 21:47:59
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning. Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "On the TULP2G download page (https://sourceforge.net/projects/tulp2g/files/), select the TULP2G-installer-1.4.0.4.msi file and download it."
A block of code is set as follows:
;Google Nexus One
%SingleAdbInterface% = USB_Install, USB\VID_18D1&PID_0D02
%CompositeAdbInterface% = USB_Install, USB\VID_18D1&PID_0D02&MI_01
%SingleAdbInterface% = USB_Install, USB\VID_18D1&PID_4E11
%CompositeAdbInterface% = USB_Install, USB\VID_18D1&PID_4E12&MI_01
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "When the program is launched, click on the Open Profile... button."
Warnings or important notes appear like this.
Tips and tricks appear like this.
- 信息系統安全檢測與風險評估
- Wireshark 2 Quick Start Guide
- Getting Started with FortiGate
- 工業物聯網安全
- 計算機病毒原理與防范(第2版)
- 網絡安全技術及應用(第3版)
- 網絡關鍵設備安全檢測實施指南
- VMware vCloud Security
- Cybersecurity Threats,Malware Trends,and Strategies
- 復雜信息系統網絡安全體系建設指南
- Web安全攻防從入門到精通
- 黑客攻防從入門到精通:絕招版(第2版)
- ATT&CK框架實踐指南(第2版)
- Python Penetration Testing Essentials
- Learning Metasploit Exploitation and Development