- Kali Linux Wireless Penetration Testing:Beginner's Guide
- Vivek Ramachandran Cameron Buchanan
- 145字
- 2021-07-23 19:45:25
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "Open a console terminal and type in iwconfig
."
Any command-line input or output is written as follows:
airodump-ng –bssid 00:21:91:D2:8E:25 --channel 11 --write WEPCrackingDemo mon0
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Boot the laptop with this DVD and select the option Install from the Boot menu."
推薦閱讀
- 解構產品經理:互聯網產品策劃入門寶典
- Python網絡爬蟲從入門到實踐(第2版)
- Raspberry Pi for Secret Agents(Third Edition)
- Python自然語言處理(微課版)
- Instant QlikView 11 Application Development
- INSTANT OpenNMS Starter
- UVM實戰
- Android應用案例開發大全(第二版)
- Linux Shell核心編程指南
- Learning Continuous Integration with TeamCity
- Java圖像處理:基于OpenCV與JVM
- Deep Learning with R Cookbook
- JavaScript編程精解(原書第2版)
- Java并發實現原理:JDK源碼剖析
- Python 快速入門(第3版)