- Kali Linux Network Scanning Cookbook
- Justin Hutchens
- 175字
- 2021-09-03 09:58:00
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "The ls
command can be used to view the contents of the current directory."
A block of code is set as follows:
#! /usr/bin/python name = raw_input("What is your name?\n") print "Hello " + name
Any command-line input or output is written as follows:
# root@KaliLinux:~# ./test.py What is your name? Justin Hello Justin
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Once you have opened VMware Player, you can select Create a New Virtual Machine to get started."
Note
Warnings or important notes appear in a box like this.
Tip
Tips and tricks appear like this.
- CTF實戰(zhàn):技術、解題與進階
- CSO進階之路:從安全工程師到首席安全官
- 黑客攻防入門秘笈
- 網絡安全技術及應用(第3版)
- Learning Veeam? Backup & Replication for VMware vSphere
- 同態(tài)密碼學原理及算法
- 可信計算3.0工程初步(第二版)
- 信息安全導論(第2版)
- SQL Injection Strategies
- 網絡安全大數據分析與實戰(zhàn)
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 構建新型網絡形態(tài)下的網絡空間安全體系
- Mastering Python for Networking and Security
- Kali Linux高級滲透測試(原書第4版)
- 物聯(lián)網信息安全技術