- Microsoft System Center 2012 Endpoint Protection Cookbook
- Andrew Plue
- 137字
- 2021-08-05 18:49:52
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text are shown as follows: "The local SCEP client logs are stored in the program data
folder".
Any command-line input or output is written as follows:
Threat Name:VirTool:JS/Obfuscator ID:2147632206 Severity:5 Number of Resources:2 Resource Schema:file Resource Path:C:\Users\username\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OG2NNMHR\badwebpage.htm
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Click on File from the menu bar and select Exit to close the logfile ".
推薦閱讀
- RESTful Java Web Services Security
- 白話網絡安全2:網安戰略篇
- Web漏洞分析與防范實戰:卷1
- Metasploit Penetration Testing Cookbook(Third Edition)
- 電子支付的規制結構配置研究
- 安全實戰之滲透測試
- Web安全與攻防入門很輕松(實戰超值版)
- 反黑命令與攻防從新手到高手(微課超值版)
- Learning Veeam? Backup & Replication for VMware vSphere
- Kali Linux Wireless Penetration Testing Cookbook
- 云原生安全技術實踐指南
- 可信計算3.0工程初步(第二版)
- 功能型密碼算法設計與分析
- Learn Azure Sentinel
- 動態賦能網絡空間防御