- Advanced Penetration Testing for Highly-Secured Environments:The Ultimate Security Guide
- Lee Allen
- 188字
- 2021-08-06 19:58:27
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text are shown as follows: "We will use a picture named FotoStation.jpg
".
A block of code is set as follows:
ExifTool Version Number : 7.89 File Name : FlashPix.ppt Directory : ./t/images File Size : 9.5 kB
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
HEAD / HTTP/1.0
HTTP/1.1 200 OK
Content-Length: 9908
Content-Type: text/html
Any command-line input or output is written as follows:
# cd /pentest/enumeration/google/metagoofil
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Setting the Network adapter to Internal Network allows our BackTrack system to share the same subnet with the newly-created Ubuntu machine."
- C++黑客編程揭秘與防范
- 物聯網安全:理論、實踐與創新
- HCNA網絡技術
- Drush User’s Guide
- Socket.IO Real-time Web Application Development
- 物聯網技術與應用
- Metasploit Penetration Testing Cookbook
- 數字調制解調技術的MATLAB與FPGA實現:Altera/Verilog版(第2版)
- Mastering Dart
- IPv6網絡切片:使能千行百業新體驗
- bash網絡安全運維
- Building RESTful Web Services with .NET Core
- 數字王國里的虛擬人:技術、商業與法律解讀
- 5G智慧交通
- Hands-On Reactive Programming in Spring 5