- Learning iOS Security
- Allister Banks Charles S. Edge
- 170字
- 2021-07-23 20:13:09
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "While not exactly simple, one could use openssl
on various operating systems, in tandem with a root certificate from a trusted certificate authority, to apply signatures to configuration profiles, which devices will then see as trusted."
Any command-line input or output is written as follows:
codesign -d -vv /Users/abanks/Music/iTunes/iTunes\ Media/Mobile\ Applications/Dropbox\ 3.5.2/Payload/Dropbox.app
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "This is exposed to end users with a Send All Traffic slider when optional.
- C語言程序設計實踐教程(第2版)
- Getting Started with ResearchKit
- PHP 7底層設計與源碼實現
- 趣學Python算法100例
- Neo4j Essentials
- 表哥的Access入門:以Excel視角快速學習數據庫開發(第2版)
- Python深度學習:模型、方法與實現
- 實戰Java高并發程序設計(第2版)
- HTML5 WebSocket權威指南
- Learning Alfresco Web Scripts
- Raspberry Pi開發實戰
- 深入理解Zabbix監控系統
- LibGDX Game Development By Example
- Getting Started with Hazelcast
- MATLAB語言及編程實踐:生物數學模型應用