- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 147字
- 2021-07-02 23:30:48
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "Open a terminal in Kali Linux and type, git clone https://github.com/nmap/nmap.git to begin the cloning process."
A block of code is set as follows:
<p style="text-align: center;"> <p style="box-sizing: border-box; display: inline-block; width: auto; max-width: 480px; background-color: #FFFFFF; border: 2px solid #0361A8; border-radius: 5px; box-shadow: 0px 0px 8px #0361A8; margin: 50px auto auto;"> <p style="background: #38ACEC; border-radius: 5px 5px 0px 0px; padding: 15px;">
Any command-line input or output is written as follows:
nmap -p 80 192.168.0.9
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "Go to Places | Home Folder."
Warnings or important notes appear in a box like this.
Tips and tricks appear like this.
- 零信任網絡:在不可信網絡中構建安全系統
- 網絡安全保障能力研究
- Wireshark 2 Quick Start Guide
- 等級保護測評理論及應用
- 工業控制網絡安全技術
- Kali Linux Network Scanning Cookbook(Second Edition)
- 模糊測試:強制發掘安全漏洞的利器
- ARM匯編與逆向工程:藍狐卷·基礎知識
- 網絡安全能力成熟度模型:原理與實踐
- Building a Home Security System with BeagleBone
- Digital Forensics with Kali Linux
- 數據安全與流通:技術、架構與實踐
- Mastering Reverse Engineering
- 網絡用戶行為的安全可信分析與控制
- 黑客攻防實戰從入門到精通