- Digital Forensics and Incident Response
- Gerard Johansen
- 199字
- 2021-07-02 18:49:41
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning. Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: The constituency can be defined either as a domain such as local.example.com or an organization name such as Acme Inc. and associated subsidiary organizations.
A block of code is set as follows:
rule PoisonIvy_Generic_3 {
meta:
description = "PoisonIvy RAT Generic Rule"
author = "Florian Roth"
date = "2015-05-14"
hash = "e1cbdf740785f97c93a0a7a01ef2614be792afcd"
strings:
$k1 = "Tiger324{" fullword ascii
Any command-line input or output is written as follows:
caine@caine~$ tcpdump -D
caine@caine~$ sudotcpdump -i ens33 -v
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "In order for F-Response to be able to acquire the necessary evidence, an agent has to be installed.by right-clicking on the system and choosing Install/Start F-Response"
- PWA入門與實踐
- Apache Oozie Essentials
- TensorFlow Lite移動端深度學習
- Unity 2020 Mobile Game Development
- Learn Programming in Python with Cody Jackson
- C語言程序設計
- HTML 5與CSS 3權威指南(第3版·上冊)
- TMS320LF240x芯片原理、設計及應用
- Android傳感器開發與智能設備案例實戰
- FFmpeg開發實戰:從零基礎到短視頻上線
- Beginning C# 7 Hands-On:The Core Language
- H5頁面設計與制作(全彩慕課版·第2版)
- PHP 7 Programming Blueprints
- Java基礎案例教程(第2版)
- Access 2013數據庫應用案例課堂