- Mastering Mobile Forensics
- Soufiane Tahiri
- 159字
- 2021-07-16 10:37:08
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "The res
directory is the directory used to store application resources."
A block of code is set as follows:
for i = 1 to Nr-1 stepsize 1 do SubBytes(state); ShiftRows(state); MixColumns(state); AddRoundKey(state,round_key[i]); end for
Any command-line input or output is written as follows:
adb shell pm path com.facebook.lite
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "After opening the software, click on Open File."
推薦閱讀
- 為你護航:網絡空間安全科普讀本(第2版)
- 安全實戰之滲透測試
- Python Penetration Testing Cookbook
- CTF競賽權威指南(Pwn篇)
- 計算機網絡安全基礎(第5版)
- 網絡安全與攻防入門很輕松(實戰超值版)
- CTF那些事兒
- 信息安全工程與實踐
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Kali Linux高級滲透測試(原書第4版)
- Mastering Malware Analysis
- 云計算安全防護技術
- INSTANT Kali Linux
- 網絡攻防實戰研究:MySQL數據庫安全
- 安全網絡構建