- Mobile Forensics Cookbook
- Igor Mikhaylov
- 153字
- 2021-07-02 21:47:59
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning. Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "On the TULP2G download page (https://sourceforge.net/projects/tulp2g/files/), select the TULP2G-installer-1.4.0.4.msi file and download it."
A block of code is set as follows:
;Google Nexus One
%SingleAdbInterface% = USB_Install, USB\VID_18D1&PID_0D02
%CompositeAdbInterface% = USB_Install, USB\VID_18D1&PID_0D02&MI_01
%SingleAdbInterface% = USB_Install, USB\VID_18D1&PID_4E11
%CompositeAdbInterface% = USB_Install, USB\VID_18D1&PID_4E12&MI_01
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "When the program is launched, click on the Open Profile... button."
Warnings or important notes appear like this.
Tips and tricks appear like this.
- CTF實(shí)戰(zhàn):技術(shù)、解題與進(jìn)階
- unidbg逆向工程:原理與實(shí)踐
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)(第6版·慕課版)
- Learning Python for Forensics
- 信息系統(tǒng)安全檢測與風(fēng)險(xiǎn)評(píng)估
- 開發(fā)者的Web安全戒律:真實(shí)威脅與防御實(shí)踐
- Penetration Testing with Perl
- 云原生安全與DevOps保障
- 計(jì)算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- API安全技術(shù)與實(shí)戰(zhàn)
- 互聯(lián)網(wǎng)企業(yè)安全高級(jí)指南
- 構(gòu)建新型網(wǎng)絡(luò)形態(tài)下的網(wǎng)絡(luò)空間安全體系
- 華為Anti-DDoS技術(shù)漫談
- 白話零信任
- CCNA Security 210-260 Certification Guide