- Practical Linux Security Cookbook
- Tajinder Kalsi
- 145字
- 2021-07-16 11:05:27
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "The md5sum
command will then print the calculated hash in a single line."
Any command-line input or output is written as follows:
telinit 1
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "Navigate to Main Menu | Backtrack | Exploitation Tools | Network Exploitation Tools | Metasploit Framework | Msfconsole."
推薦閱讀
- Java程序設計與開發
- SOA實踐
- ASP.NET Core 5.0開發入門與實戰
- Power Up Your PowToon Studio Project
- 跟老齊學Python:輕松入門
- 實戰低代碼
- Raspberry Pi 2 Server Essentials
- Java Web開發技術教程
- Windows Forensics Cookbook
- PhoneGap:Beginner's Guide(Third Edition)
- RSpec Essentials
- jQuery炫酷應用實例集錦
- INSTANT Sinatra Starter
- Internet of Things with ESP8266
- Mastering ArcGIS Enterprise Administration