- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 185字
- 2021-06-24 16:38:55
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "Mount the downloaded WebStorm-10*.dmg disk image file as another disk in your system."
A block of code is set as follows:
html, body, #map {
height: 100%;
margin: 0;
padding: 0
}
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
[default]
exten => s,1,Dial(Zap/1|30)
exten => s,2,Voicemail(u100)
exten => s,102,Voicemail(b100)
exten => i,1,Voicemail(s0)
Any command-line input or output is written as follows:
$ mkdir css
$ cd css
Bold: Indicates a new term, an important word, or words that you see on screen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Select System info from the Administration panel."
- Metasploit Penetration Testing Cookbook(Second Edition)
- CSO進階之路:從安全工程師到首席安全官
- 計算機病毒原理與防范(第2版)
- 數據安全與隱私計算(第3版)
- Testing and Securing Android Studio Applications
- 數據安全領域指南
- 物聯網安全滲透測試技術
- 華為防火墻實戰指南
- 數據保護:工作負載的可恢復性
- 物聯網信息安全技術
- 網絡攻防實戰研究:MySQL數據庫安全
- 云計算安全:關鍵技術、原理及應用
- 黑客攻防與電腦安全從新手到高手(超值版)
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice
- Web前端黑客技術揭秘