- Android Security Cookbook
- Keith Makan Scott Alexander Bown
- 213字
- 2021-07-21 17:52:57
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "The system image ID you selected from the previous step must be specified using the –t
switch."
A block of code is set as follows:
from drozer import android from drozer.modules import common, Module class AttackSurface(Module,common.Filters, common.PackageManager):
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold as follows:
from drozer import android
from drozer.modules import common, Module
class AttackSurface(Module,common.Filters, common.PackageManager):
Any command-line input or output is written as follows:
sudo aptitude update //If you have aptitude installed
New terms and important words are shown in bold. Words that you see on the screen, in menus, or dialog boxes, for example, appear in the text like this: "Once you've accepted the licenses, you can collect your documentation and APIs by clicking on Install".
- Android應用安全實戰:Frida協議分析
- SASE原理、架構與實踐
- Learning Python for Forensics
- 可信計算3.0工程初步
- 電子支付的規制結構配置研究
- 計算機使用安全與防護
- Learning Veeam? Backup & Replication for VMware vSphere
- 數字化轉型浪潮下的數據安全最佳實踐指南
- 局域網交換機安全
- 功能型密碼算法設計與分析
- 信息系統安全等級化保護原理與實踐
- 云計算安全:關鍵技術、原理及應用
- Kali Linux無線網絡滲透測試詳解
- 計算機網絡安全與應用技術(第2版)
- CCNA Security 210-260 Certification Guide