- BeagleBone for Secret Agents
- Josh Datko
- 244字
- 2021-08-05 17:58:18
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "The LCD, controlled by the FrontPanelDisplay
class, writes to the serial port, /dev/ttyO4
, on BBB's UART 4 at 9600 baud."
A block of code is set as follows:
self.clear_screen() up_str = '{0:<16}'.format('Up: ' + self.block_char * up) dn_str = '{0:<16}'.format('Down: ' + self.block_char * down) self.port.write(up_str) self.port.write(dn_str)
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
import Adafruit_BBIO.UART as UART
import serial
class FrontPanelDisplay(object):
def __init__(self):
self.uart = 'UART4'
UART.setup(self.uart)
self.port = serial.Serial(port="/dev/ttyO4", baudrate=9600)
self.port.open()
Any command-line input or output is written as follows:
Mar 25 21:37:43.000 [notice] Tor has successfully opened a circuit. Looks like client functionality is working. Mar 25 21:37:43.000 [notice] Bootstrapped 100%: Done.
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "To connect to your bridge, launch the Tor browser and click on Open Settings as it starts up."
Note
Warnings or important notes appear in a box like this.
Tip
Tips and tricks appear like this.
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- Web漏洞分析與防范實(shí)戰(zhàn):卷1
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- Metasploit Penetration Testing Cookbook(Third Edition)
- 工業(yè)互聯(lián)網(wǎng)安全防護(hù)與展望
- Web安全與攻防入門很輕松(實(shí)戰(zhàn)超值版)
- 數(shù)字安全藍(lán)皮書:本質(zhì)屬性與重要特征
- API攻防:Web API安全指南
- 軟件開發(fā)安全之道:概念、設(shè)計(jì)與實(shí)施
- Computer Forensics with FTK
- 網(wǎng)絡(luò)運(yùn)維親歷記 (網(wǎng)絡(luò)運(yùn)維紀(jì)實(shí)文學(xué))
- CTF競(jìng)賽權(quán)威指南(Pwn篇)
- 互聯(lián)網(wǎng)企業(yè)安全高級(jí)指南
- 人工智能安全(精裝版)
- Cybersecurity Threats,Malware Trends,and Strategies