- Effective Python Penetration Testing
- Rejah Rehim
- 192字
- 2021-07-14 11:29:44
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "We can include other contexts through the use of the include
directive."
A block of code is set as follows:
import socket socket.setdefaulttimeout(3) newSocket = socket.socket() newSocket.connect(("localhost",22))
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
import socket
socket.setdefaulttimeout(3)
newSocket = socket.socket() newSocket.connect(("localhost",22))
Any command-line input or output is written as follows:
$ pip install packagename
Python interactive terminal commands and output is written as follows.
>>> packet=IP(dst='google.com')
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "Click on the OS X link."
Note
Warnings or important notes appear in a box like this.
Tip
Tips and tricks appear like this.
- 深入理解Bootstrap
- 編程的修煉
- 軟件項目管理(第2版)
- iOS 9 Game Development Essentials
- Mastering phpMyAdmin 3.4 for Effective MySQL Management
- 云計算通俗講義(第3版)
- Jupyter數據科學實戰
- 大話Java:程序設計從入門到精通
- MySQL程序員面試筆試寶典
- Web App Testing Using Knockout.JS
- Learning Unreal Engine Game Development
- R的極客理想:量化投資篇
- Swift High Performance
- Daniel Arbuckle's Mastering Python
- 計算機信息技術實踐教程