- Learning iOS Penetration Testing
- Swaroop Yermalkar
- 159字
- 2021-07-23 14:49:13
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "Developing and executing the Hello World
application is very simple and straightforward process."
A block of code is set as follows:
USERNAME - (user|username|login)(\s)*=(\s)*('|") PASSWORD - (pass|password|key)(\s)*=(\s)*('|")
Any command-line input or output is written as follows:
sudo ./cycript –p 2006
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "Start Xcode from your OS X. It is just as easy as clicking on the Xcode icon."
Note
Warnings or important notes appear in a box like this.
Tip
Tips and tricks appear like this.
- Web應用系統開發實踐(C#)
- 零基礎學C++程序設計
- Mastering OpenCV Android Application Programming
- 垃圾回收的算法與實現
- Magento 2 Theme Design(Second Edition)
- Hands-On JavaScript High Performance
- Mathematica Data Analysis
- Visual C#.NET Web應用程序設計
- MINECRAFT編程:使用Python語言玩轉我的世界
- Visual FoxPro 6.0程序設計
- MySQL數據庫應用實戰教程(慕課版)
- Visual C#(學習筆記)
- Java Script從入門到精通(第5版)
- Perl 6 Deep Dive
- ASP.NET 4權威指南