- Microsoft System Center 2012 Endpoint Protection Cookbook
- Andrew Plue
- 137字
- 2021-08-05 18:49:52
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text are shown as follows: "The local SCEP client logs are stored in the program data
folder".
Any command-line input or output is written as follows:
Threat Name:VirTool:JS/Obfuscator ID:2147632206 Severity:5 Number of Resources:2 Resource Schema:file Resource Path:C:\Users\username\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OG2NNMHR\badwebpage.htm
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Click on File from the menu bar and select Exit to close the logfile ".
推薦閱讀
- Node Security
- 信息安全導論(在線實驗+在線自測)
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 網絡安全三十六計:人人該懂的防黑客技巧
- 移動APT:威脅情報分析與數據防護
- 計算機網絡安全基礎(第5版)
- Kerberos域網絡安全從入門到精通
- 情報驅動應急響應
- Learning Pentesting for Android Devices
- 黑客攻防從入門到精通
- 構建新型網絡形態下的網絡空間安全體系
- Mastering Metasploit
- 計算機網絡安全實驗指導
- 交換機·路由器·防火墻(第2版)
- Android Application Security Essentials