- Mobile Forensics Cookbook
- Igor Mikhaylov
- 153字
- 2021-07-02 21:47:59
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning. Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "On the TULP2G download page (https://sourceforge.net/projects/tulp2g/files/), select the TULP2G-installer-1.4.0.4.msi file and download it."
A block of code is set as follows:
;Google Nexus One
%SingleAdbInterface% = USB_Install, USB\VID_18D1&PID_0D02
%CompositeAdbInterface% = USB_Install, USB\VID_18D1&PID_0D02&MI_01
%SingleAdbInterface% = USB_Install, USB\VID_18D1&PID_4E11
%CompositeAdbInterface% = USB_Install, USB\VID_18D1&PID_4E12&MI_01
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "When the program is launched, click on the Open Profile... button."
Warnings or important notes appear like this.
Tips and tricks appear like this.
- 攻守道:企業數字業務安全風險與防范
- 工業互聯網安全防護與展望
- 工業控制網絡安全技術
- Preventing Digital Extortion
- 數據安全實踐指南
- Digital Forensics with Kali Linux
- 從實踐中學習Kali Linux滲透測試
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 隱私計算:推進數據“可用不可見”的關鍵技術
- 華為Anti-DDoS技術漫談
- Kali Linux高級滲透測試(原書第4版)
- 云計算安全:關鍵技術、原理及應用
- 信息組織
- 黑客攻防從入門到精通:絕招版(第2版)
- Hands-On Bug Hunting for Penetration Testers