- Information Security Handbook
- Darren Death
- 94字
- 2021-07-02 21:55:46
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning. Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "The next lines of code read the link and assign it to the <script>123</script>.
New terms and important words are shown in bold.
Warnings or important notes appear like this.
Tips and tricks appear like this.
推薦閱讀
- Unreal Engine:Game Development from A to Z
- AutoCAD繪圖實用速查通典
- 三菱FX3U/5U PLC從入門到精通
- 面向STEM的mBlock智能機器人創新課程
- 大數據安全與隱私保護
- AWS Certified SysOps Administrator:Associate Guide
- INSTANT Drools Starter
- 突破,Objective-C開發速學手冊
- Microsoft System Center Confi guration Manager
- 深度學習與目標檢測
- Silverlight 2完美征程
- 重估:人工智能與賦能社會
- 典型Hadoop云計算
- Access 2007數據庫入門與實例應用金典
- Java求職寶典