- Penetration Testing Bootcamp
- Jason Beltrame
- 148字
- 2021-07-02 21:35:53
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "you will want to write the image to it using the dd command."
Any command-line input or output is written as follows:
root@kali:~# sysctl -a list | grep net.ipv4.ip_forward net.ipv4.ip_forward = 1
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "You will need to go into VMware Fusion and navigate to File | New."
Warnings or important notes appear in a box like this.
Tips and tricks appear like this.
推薦閱讀
- SPSS數(shù)據(jù)挖掘與案例分析應(yīng)用實(shí)踐
- Facebook Application Development with Graph API Cookbook
- Python for Secret Agents:Volume II
- Scratch真好玩:教小孩學(xué)編程
- SEO智慧
- Learning ArcGIS for Desktop
- 蘋果的產(chǎn)品設(shè)計(jì)之道:創(chuàng)建優(yōu)秀產(chǎn)品、服務(wù)和用戶體驗(yàn)的七個(gè)原則
- 從零開始學(xué)Linux編程
- Learning Concurrency in Python
- Akka入門與實(shí)踐
- Java程序設(shè)計(jì)教程
- Manage Your SAP Projects with SAP Activate
- Getting Started with Windows Server Security
- Python全棧開發(fā):數(shù)據(jù)分析
- Java Script從入門到精通(第5版)