- Learning iOS Security
- Allister Banks Charles S. Edge
- 170字
- 2021-07-23 20:13:09
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "While not exactly simple, one could use openssl
on various operating systems, in tandem with a root certificate from a trusted certificate authority, to apply signatures to configuration profiles, which devices will then see as trusted."
Any command-line input or output is written as follows:
codesign -d -vv /Users/abanks/Music/iTunes/iTunes\ Media/Mobile\ Applications/Dropbox\ 3.5.2/Payload/Dropbox.app
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "This is exposed to end users with a Send All Traffic slider when optional.
- Implementing VMware Horizon 7(Second Edition)
- 大學計算機基礎(第三版)
- Mobile Web Performance Optimization
- Magento 2 Theme Design(Second Edition)
- Access 2010數據庫基礎與應用項目式教程(第3版)
- Python機器學習經典實例
- 從Java到Web程序設計教程
- Practical Game Design with Unity and Playmaker
- 從Power BI到Analysis Services:企業級數據分析實戰
- Oracle實用教程
- PHP 7 Programming Blueprints
- Learning Apache Thrift
- Vue.js項目開發實戰
- C#編程魔法書
- 面向WebAssembly編程:應用開發方法與實踐