- Kali Linux:An Ethical Hacker's Cookbook(Second Edition)
- Himanshu Sharma
- 126字
- 2021-06-24 15:59:09
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "Choose the xfce-session option (in our case, 3) and press Enter."
Any command-line input or output is written as follows:
update-alternatives --config x-session-manager
Bold: Indicates a new term, an important word, or words that you see on screen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "In the Payloads tab, we select the Payload type as Extension-generated."
Warnings or important notes appear like this.
Tips and tricks appear like this.
推薦閱讀
- 發布!設計與部署穩定的分布式系統(第2版)
- FreeRTOS實時內核應用指南
- Arch Linux Environment Setup How-to
- 白話區塊鏈
- Application Development in iOS 7
- NetDevOps入門與實踐
- Social Data Visualization with HTML5 and JavaScript
- 新編電腦辦公(Windows 10+ Office 2013版)從入門到精通
- Python UNIX和Linux系統管理指南
- bash shell腳本編程經典實例(第2版)
- 電腦辦公(Windows 10 + Office 2016)入門與提高(超值版)
- 完美應用Ubuntu(第2版)
- Office 365 User Guide
- 操作系統之哲學原理第2版
- Implementing Cloud Design Patterns for AWS(Second Edition)