- Penetration Testing Bootcamp
- Jason Beltrame
- 148字
- 2021-07-02 21:35:53
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "you will want to write the image to it using the dd command."
Any command-line input or output is written as follows:
root@kali:~# sysctl -a list | grep net.ipv4.ip_forward net.ipv4.ip_forward = 1
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "You will need to go into VMware Fusion and navigate to File | New."
Warnings or important notes appear in a box like this.
Tips and tricks appear like this.
推薦閱讀
- The Modern C++ Challenge
- C# 2012程序設計實踐教程 (清華電腦學堂)
- Magento 2 Theme Design(Second Edition)
- Mastering Kali Linux for Web Penetration Testing
- 精通Python自然語言處理
- FFmpeg入門詳解:音視頻原理及應用
- 軟件工程基礎與實訓教程
- ASP.NET Web API Security Essentials
- 深入淺出Python數據分析
- UML基礎與Rose建模實用教程(第三版)
- Java從入門到精通(視頻實戰版)
- 少年小魚的魔法之旅:神奇的Python
- JavaScript程序設計基礎教程(慕課版)
- 深入解析Java虛擬機HotSpot
- 小學生C++編程課堂(新手篇)