- Learning iOS Security
- Allister Banks Charles S. Edge
- 170字
- 2021-07-23 20:13:09
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "While not exactly simple, one could use openssl
on various operating systems, in tandem with a root certificate from a trusted certificate authority, to apply signatures to configuration profiles, which devices will then see as trusted."
Any command-line input or output is written as follows:
codesign -d -vv /Users/abanks/Music/iTunes/iTunes\ Media/Mobile\ Applications/Dropbox\ 3.5.2/Payload/Dropbox.app
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "This is exposed to end users with a Send All Traffic slider when optional.
- 數據庫系統原理及MySQL應用教程(第2版)
- Java異步編程實戰
- Java入門經典(第6版)
- C#編程入門指南(上下冊)
- Python網絡爬蟲從入門到實踐(第2版)
- Learning Firefox OS Application Development
- Machine Learning in Java
- Spring Boot+Vue全棧開發實戰
- Geospatial Development By Example with Python
- HTML5+CSS3+jQuery Mobile APP與移動網站設計從入門到精通
- TypeScript 2.x By Example
- C指針原理揭秘:基于底層實現機制
- 深入理解BootLoader
- Learning Grunt
- Java 9:Building Robust Modular Applications