- Learning Pentesting for Android Devices
- Aditya Gupta
- 197字
- 2021-07-16 12:13:46
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. The following are some examples of these styles, and an explanation of their meaning:
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows:
"Now, just like we saw in the earlier section, the application will store its data in the location /data/data/[package name]
."
A block of code is set as follows:
shell@android:/data # cd /data/system shell@android:/data/system # rm gesture.key
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
<permission name="android.permission.BLUETOOTH" > <group gid="net_bt" /> </permission>
Any command-line input or output is written as follows:
$ unzip testing.apk $ cd META-INF
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like the following:
"You could set up your own pattern by navigating to Settings | Security | Screen Lock."
- Learning Python for Forensics
- Metasploit Penetration Testing Cookbook(Third Edition)
- Kali Linux Social Engineering
- Getting Started with FortiGate
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- 安全技術運營:方法與實踐
- 數據安全實踐指南
- 數據安全領域指南
- Instant Java Password and Authentication Security
- 網絡安全設計、配置與管理大全
- Web安全之深度學習實戰
- 網絡關鍵設備安全檢測實施指南
- VMware vCloud Security
- 網絡空間安全:拒絕服務攻擊檢測與防御
- 信息內容安全管理及應用