- Practical Mobile Forensics(Second Edition)
- Heather Mahalik Rohit Tamma Satish Bommisetty
- 134字
- 2021-07-16 10:55:46
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text are shown as follows: "The user data partition occupies most of the NAND memory and is mounted at /private/var
on the device."
Any command-line input or output is written as follows:
$ git clone https://github.com/benvium/libimobiledevice-macosx.git ~/Desktop/libimobiledevice-macosx/
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Every time an application is suspended to the background by pressing the Home button".
推薦閱讀
- 數字身份與元宇宙信任治理
- Kali Linux Social Engineering
- 大型互聯網企業安全架構
- 等級保護測評理論及應用
- 同態密碼學原理及算法
- Testing and Securing Android Studio Applications
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 網絡安全與攻防入門很輕松(實戰超值版)
- 信息安全導論(第2版)
- Mastering Linux Security and Hardening
- 華為Anti-DDoS技術漫談
- Hands-On Artificial Intelligence for Cybersecurity
- Web安全攻防從入門到精通
- 網絡安全監控實戰:深入理解事件檢測與響應
- Blockchain Development with Hyperledger