- Kali Linux Wireless Penetration Testing:Beginner's Guide
- Vivek Ramachandran Cameron Buchanan
- 145字
- 2021-07-23 19:45:25
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "Open a console terminal and type in iwconfig
."
Any command-line input or output is written as follows:
airodump-ng –bssid 00:21:91:D2:8E:25 --channel 11 --write WEPCrackingDemo mon0
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Boot the laptop with this DVD and select the option Install from the Boot menu."
推薦閱讀
- Mastering Concurrency Programming with Java 8
- Node.js 10實(shí)戰(zhàn)
- Spring Cloud Alibaba微服務(wù)架構(gòu)設(shè)計(jì)與開發(fā)實(shí)戰(zhàn)
- Building a Game with Unity and Blender
- Mastering PHP Design Patterns
- Banana Pi Cookbook
- C語言程序設(shè)計(jì)同步訓(xùn)練與上機(jī)指導(dǎo)(第三版)
- Haskell Data Analysis Cookbook
- Machine Learning in Java
- Java網(wǎng)絡(luò)編程實(shí)戰(zhàn)
- Spring技術(shù)內(nèi)幕:深入解析Spring架構(gòu)與設(shè)計(jì)原理(第2版)
- Unity Character Animation with Mecanim
- 單片機(jī)原理及應(yīng)用技術(shù)
- SQL Server on Linux
- Java EE 7 Development with WildFly