- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 104字
- 2021-06-30 19:15:44
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "Mount the downloaded WebStorm-10*.dmg disk image file as another disk in your system."
Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Select System info from the Administration panel."
Warnings or important notes appear like this.
Tips and tricks appear like this.
推薦閱讀
- Linux運維實戰:CentOS7.6操作系統從入門到精通
- Windows Server 2012網絡操作系統企業應用案例詳解
- 8051軟核處理器設計實戰
- 竹林蹊徑:深入淺出windows驅動開發
- Learning Magento 2 Administration
- 分布式系統設計實踐
- Linux操作系統
- iOS 10 開發指南
- 大學計算機應用基礎實踐教程(Windows 7+MS Office 2010)
- 完美應用Ubuntu(第2版)
- Linux操作系統案例教程(第2版)
- openEuler操作系統核心技術與行業應用實踐
- 再也不踩坑的kubernetes實戰指南
- Getting Started with Raspberry Pi Zero
- iOS Programming Cookbook