- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 185字
- 2021-06-24 16:38:55
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "Mount the downloaded WebStorm-10*.dmg disk image file as another disk in your system."
A block of code is set as follows:
html, body, #map {
height: 100%;
margin: 0;
padding: 0
}
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
[default]
exten => s,1,Dial(Zap/1|30)
exten => s,2,Voicemail(u100)
exten => s,102,Voicemail(b100)
exten => i,1,Voicemail(s0)
Any command-line input or output is written as follows:
$ mkdir css
$ cd css
Bold: Indicates a new term, an important word, or words that you see on screen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Select System info from the Administration panel."
- DevSecOps敏捷安全
- 網(wǎng)絡(luò)安全保障能力研究
- 信息系統(tǒng)安全檢測(cè)與風(fēng)險(xiǎn)評(píng)估
- 黑客攻防技巧
- 網(wǎng)絡(luò)空間安全:管理者讀物
- 計(jì)算機(jī)使用安全與防護(hù)
- 局域網(wǎng)交換機(jī)安全
- 數(shù)據(jù)安全領(lǐng)域指南
- Learning Pentesting for Android Devices
- Bug Bounty Hunting Essentials
- Mastering Linux Security and Hardening
- 聯(lián)邦學(xué)習(xí)原理與算法
- 從實(shí)踐中學(xué)習(xí)Nmap滲透測(cè)試
- ATT&CK與威脅獵殺實(shí)戰(zhàn)
- 密碼朋克:自由與互聯(lián)網(wǎng)的未來(lái)