- Information Security Handbook
- Darren Death
- 94字
- 2021-07-02 21:55:46
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning. Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "The next lines of code read the link and assign it to the <script>123</script>.
New terms and important words are shown in bold.
Warnings or important notes appear like this.
Tips and tricks appear like this.
推薦閱讀
- Seven NoSQL Databases in a Week
- TIBCO Spotfire:A Comprehensive Primer(Second Edition)
- 21天學通Java
- DevOps:Continuous Delivery,Integration,and Deployment with DevOps
- 觸控顯示技術
- Machine Learning with Apache Spark Quick Start Guide
- Machine Learning with the Elastic Stack
- MCGS嵌入版組態軟件應用教程
- 嵌入式操作系統原理及應用
- Extending Ansible
- 中文版AutoCAD 2013高手速成
- 單片機技術項目化原理與實訓
- 實戰Windows Azure
- Generative Adversarial Networks Projects
- 大數據:從基礎理論到最佳實踐