- Learning iOS Penetration Testing
- Swaroop Yermalkar
- 159字
- 2021-07-23 14:49:13
Conventions
In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "Developing and executing the Hello World
application is very simple and straightforward process."
A block of code is set as follows:
USERNAME - (user|username|login)(\s)*=(\s)*('|") PASSWORD - (pass|password|key)(\s)*=(\s)*('|")
Any command-line input or output is written as follows:
sudo ./cycript –p 2006
New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "Start Xcode from your OS X. It is just as easy as clicking on the Xcode icon."
Note
Warnings or important notes appear in a box like this.
Tip
Tips and tricks appear like this.
- Mastering Adobe Captivate 2017(Fourth Edition)
- 算法精粹:經典計算機科學問題的Python實現
- Visual Basic程序設計習題解答與上機指導
- Learning Neo4j 3.x(Second Edition)
- Mastering RStudio:Develop,Communicate,and Collaborate with R
- HTML5入門經典
- PHP+MySQL+Dreamweaver動態網站開發從入門到精通(第3版)
- ASP.NET開發與應用教程
- RESTful Java Web Services(Second Edition)
- Learning Apache Karaf
- 一步一步跟我學Scratch3.0案例
- Node.js 6.x Blueprints
- Java Web開發基礎與案例教程
- 嵌入式C編程實戰
- LibGDX Game Development By Example