- Hands-On Network Forensics
- Nipun Jaswal
- 159字
- 2021-06-24 16:04:15
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "We can see that the MDNS protocol communicates over port 5353."
A block of code is set as follows:
#!/usr/bin/env python
# Author: Nipun Jaswal
from prettytable import PrettyTable
import operator
import subprocess
Any command-line input or output is written as follows:
SET global general_log = 1;
Bold: Indicates a new term, an important word, or words that you see on screen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Similarly, if you need to open a packet-capture file, you can press the
Open button, browse to the capture file, and load it in the Wireshark tool."
Warnings or important notes appear like this.
Tips and tricks appear like this.
推薦閱讀
- Extending Symfony2 Web Application Framework
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- INSTANT Metasploit Starter
- Mastering Kali Linux for Advanced Penetration Testing
- 數字化轉型浪潮下的數據安全最佳實踐指南
- ARM匯編與逆向工程:藍狐卷·基礎知識
- 云原生安全與DevOps保障
- 學電腦安全與病毒防范
- 數據安全領域指南
- 從實踐中學習密碼安全與防護
- 數據保護:工作負載的可恢復性
- CTF特訓營:技術詳解、解題方法與競賽技巧
- 信息安全工程與實踐
- 網絡空間安全:拒絕服務攻擊檢測與防御
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全