- Kali Linux Network Scanning Cookbook
- Justin Hutchens
- 175字
- 2021-09-03 09:58:00
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "The ls
command can be used to view the contents of the current directory."
A block of code is set as follows:
#! /usr/bin/python name = raw_input("What is your name?\n") print "Hello " + name
Any command-line input or output is written as follows:
# root@KaliLinux:~# ./test.py What is your name? Justin Hello Justin
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Once you have opened VMware Player, you can select Create a New Virtual Machine to get started."
Note
Warnings or important notes appear in a box like this.
Tip
Tips and tricks appear like this.
- Web漏洞分析與防范實(shí)戰(zhàn):卷1
- 黑客攻防技巧
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- Getting Started with FortiGate
- API攻防:Web API安全指南
- Applied Network Security
- Digital Forensics with Kali Linux
- 先進(jìn)云安全研究與實(shí)踐
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- 實(shí)用黑客攻防技術(shù)
- VMware vCloud Security
- Mastering Malware Analysis
- 網(wǎng)絡(luò)空間安全法律問題研究
- 一本書讀透金融科技安全
- INSTANT Microsoft Forefront UAG Mobile Configuration Starter