- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 132字
- 2021-07-02 12:16:29
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "The secret variable is the data assigned by the user during his registration."
A block of code is set as follows:
GET /?url=http://localhost/server-status HTTP/1.1 Host: example.com
Any command-line input or output is written as follows:
$ mkdir css
$ cd css
Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Click on New scan."
Warnings or important notes appear like this.
Tips and tricks appear like this.
推薦閱讀
- 攻守道:企業(yè)數(shù)字業(yè)務(wù)安全風(fēng)險(xiǎn)與防范
- Android應(yīng)用安全實(shí)戰(zhàn):Frida協(xié)議分析
- 數(shù)據(jù)恢復(fù)方法及案例分析
- SASE原理、架構(gòu)與實(shí)踐
- 為你護(hù)航:網(wǎng)絡(luò)空間安全科普讀本(第2版)
- INSTANT Burp Suite Starter
- Kali Linux Network Scanning Cookbook(Second Edition)
- 解密彩虹團(tuán)隊(duì)非凡實(shí)戰(zhàn)能力:企業(yè)安全體系建設(shè)(共5冊(cè))
- Digital Forensics with Kali Linux
- 云原生安全技術(shù)實(shí)踐指南
- 信息安全案例教程:技術(shù)與應(yīng)用(第2版)
- 從實(shí)踐中學(xué)習(xí)密碼安全與防護(hù)
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- INSTANT Apple Configurator How-to
- 隱私保護(hù)機(jī)器學(xué)習(xí)