- RESTful Java Web Services Security
- René Enríquez Andrés Salazar C.
- 197字
- 2021-09-03 10:07:51
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "We are going to modify the web.xml
file."
A block of code is set as follows:
private boolean isUserAllowed(final String username, final String password, final Set<String> rolesSet) { boolean isAllowed = false; if (rolesSet.contains(ADMIN)) { isAllowed = true; } return isAllowed; } }
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
final List<String> authorizationList = headersMap.get(AUTHORIZATION_PROPERTY);
Any command-line input or output is written as follows:
mvn clean install
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "From the pop-up window, select the SSL Settings tab."
Note
Warnings or important notes appear in a box like this.
Tip
Tips and tricks appear like this.
- 工業互聯網安全防護與展望
- 暗戰亮劍:黑客滲透與防御全程實錄
- 工業控制網絡安全技術
- 網絡安全技術及應用(第3版)
- .NET安全攻防指南(上冊)
- Computer Forensics with FTK
- Applied Network Security
- CTF競賽權威指南(Pwn篇)
- 學電腦安全與病毒防范
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 情報驅動應急響應
- SQL Injection Strategies
- 持續集成:軟件質量改進和風險降低之道
- 信息技術基礎:提高篇·實驗與習題
- 網絡空間安全:拒絕服務攻擊檢測與防御