- Mobile Forensics Cookbook
- Igor Mikhaylov
- 153字
- 2021-07-02 21:47:59
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning. Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "On the TULP2G download page (https://sourceforge.net/projects/tulp2g/files/), select the TULP2G-installer-1.4.0.4.msi file and download it."
A block of code is set as follows:
;Google Nexus One
%SingleAdbInterface% = USB_Install, USB\VID_18D1&PID_0D02
%CompositeAdbInterface% = USB_Install, USB\VID_18D1&PID_0D02&MI_01
%SingleAdbInterface% = USB_Install, USB\VID_18D1&PID_4E11
%CompositeAdbInterface% = USB_Install, USB\VID_18D1&PID_4E12&MI_01
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "When the program is launched, click on the Open Profile... button."
Warnings or important notes appear like this.
Tips and tricks appear like this.
- 信息安全導論(在線實驗+在線自測)
- 信息系統(tǒng)安全檢測與風險評估
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 網(wǎng)絡(luò)安全意識導論
- 計算機使用安全與防護
- 安全技術(shù)運營:方法與實踐
- 數(shù)字化轉(zhuǎn)型浪潮下的數(shù)據(jù)安全最佳實踐指南
- 諸神之眼:Nmap網(wǎng)絡(luò)安全審計技術(shù)揭秘
- Kali Linux Network Scanning Cookbook(Second Edition)
- 模糊測試:強制發(fā)掘安全漏洞的利器
- 情報驅(qū)動應(yīng)急響應(yīng)
- 互聯(lián)網(wǎng)企業(yè)安全高級指南
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實踐
- 無線傳感器網(wǎng)絡(luò)安全與加權(quán)復(fù)雜網(wǎng)絡(luò)抗毀性建模分析