- Kali Linux Wireless Penetration Testing:Beginner's Guide
- Vivek Ramachandran Cameron Buchanan
- 145字
- 2021-07-23 19:45:25
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "Open a console terminal and type in iwconfig
."
Any command-line input or output is written as follows:
airodump-ng –bssid 00:21:91:D2:8E:25 --channel 11 --write WEPCrackingDemo mon0
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Boot the laptop with this DVD and select the option Install from the Boot menu."
推薦閱讀
- Android項(xiàng)目開發(fā)入門教程
- Visual Basic編程:從基礎(chǔ)到實(shí)踐(第2版)
- Reactive Programming with Swift
- TestNG Beginner's Guide
- 軟件測試工程師面試秘籍
- Dependency Injection in .NET Core 2.0
- 數(shù)據(jù)結(jié)構(gòu)習(xí)題精解(C語言實(shí)現(xiàn)+微課視頻)
- Learning Informatica PowerCenter 10.x(Second Edition)
- 教孩子學(xué)編程:C++入門圖解
- Learning Raspbian
- OpenStack Networking Essentials
- IoT Projects with Bluetooth Low Energy
- 跟戴銘學(xué)iOS編程:理順核心知識點(diǎn)
- JavaScript Concurrency
- 軟硬件綜合系統(tǒng)軟件需求建模及可靠性綜合試驗(yàn)、分析、評價技術(shù)