- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 151字
- 2021-07-08 09:41:09
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning. Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "To launch fierce, we type fierce -h to see the help menu."
A block of code is set as follows:
if (argc < 2) { printf("strcpy() NOT executed....\n"); printf("Syntax: %s <characters>\n", argv[0]); exit(0); }
Any command-line input or output is written as follows:
fierce -dns host.com -threads 10
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "We right-click and navigate to Search for | All commands in all modules."
Warnings or important notes appear like this.
Tips and tricks appear like this.
推薦閱讀
- Getting Started with Citrix XenApp? 7.6
- 程序員修煉之道:程序設計入門30講
- 數字媒體應用教程
- 小程序實戰視頻課:微信小程序開發全案精講
- Redis Applied Design Patterns
- Python網絡爬蟲從入門到實踐(第2版)
- Rust Cookbook
- Internet of Things with Intel Galileo
- Backbone.js Blueprints
- 嚴密系統設計:方法、趨勢與挑戰
- C#程序設計
- Hands-On Automation Testing with Java for Beginners
- Service Mesh實戰:基于Linkerd和Kubernetes的微服務實踐
- Oracle GoldenGate 12c Implementer's Guide
- Python函數式編程(第2版)