- Hands-On Network Forensics
- Nipun Jaswal
- 159字
- 2021-06-24 16:04:15
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "We can see that the MDNS protocol communicates over port 5353."
A block of code is set as follows:
#!/usr/bin/env python
# Author: Nipun Jaswal
from prettytable import PrettyTable
import operator
import subprocess
Any command-line input or output is written as follows:
SET global general_log = 1;
Bold: Indicates a new term, an important word, or words that you see on screen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Similarly, if you need to open a packet-capture file, you can press the
Open button, browse to the capture file, and load it in the Wireshark tool."
Warnings or important notes appear like this.
Tips and tricks appear like this.
推薦閱讀
- 攻守道:企業數字業務安全風險與防范
- 科技安全:戰略實踐與展望
- unidbg逆向工程:原理與實踐
- 數字身份與元宇宙信任治理
- CSO進階之路:從安全工程師到首席安全官
- 可信計算3.0工程初步
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- 數據安全實踐指南
- 數字化轉型浪潮下的數據安全最佳實踐指南
- Python Penetration Testing Cookbook
- Kali Linux Network Scanning Cookbook(Second Edition)
- Spring Security(Third Edition)
- 網絡安全能力成熟度模型:原理與實踐
- 局域網交換機安全
- 計算機網絡安全基礎(第5版)