- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 821 for tape (0.03 seconds)
-
tensorflow/c/eager/gradients.cc
Created: Tue Apr 07 12:39:13 GMT 2026 - Last Modified: Tue Feb 24 06:18:31 GMT 2026 - 19.6K bytes - Click Count (0) -
tensorflow/c/eager/BUILD
"//tensorflow/core:test", "//tensorflow/core:test_main", "@com_google_absl//absl/strings", ], ) cc_library( name = "tape", hdrs = ["tape.h"], visibility = ["//tensorflow:internal"], deps = [ "//tensorflow/core:framework", "//tensorflow/core:lib", "//tensorflow/core/config:flag_defs",Created: Tue Apr 07 12:39:13 GMT 2026 - Last Modified: Tue Feb 24 06:18:31 GMT 2026 - 33.3K bytes - Click Count (0) -
tensorflow/BUILD
"//tensorflow/c/eager:tfe_op_internal", "//tensorflow/c/eager:tfe_tensorhandle_internal", "//tensorflow/c/experimental/gradients", "//tensorflow/c/experimental/gradients/tape", "//tensorflow/c/experimental/next_pluggable_device:c_api", "//tensorflow/c/experimental/ops", "//tensorflow/c:c_api_experimental", "//tensorflow/c:c_api_internal",Created: Tue Apr 07 12:39:13 GMT 2026 - Last Modified: Tue Mar 24 21:00:18 GMT 2026 - 53.1K bytes - Click Count (0) -
docs/ru/docs/advanced/strict-content-type.md
# Строгая проверка HTTP-заголовка Content-Type { #strict-content-type-checking } По умолчанию **FastAPI** использует строгую проверку HTTP-заголовка `Content-Type` для JSON-тел запросов. Это означает, что JSON-запросы должны включать корректный заголовок `Content-Type` (например, `application/json`), чтобы тело запроса было обработано как JSON. ## Риск CSRF { #csrf-risk }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:56:20 GMT 2026 - 5.6K bytes - Click Count (0) -
docs/es/docs/advanced/strict-content-type.md
# Chequeo estricto de Content-Type { #strict-content-type-checking } Por defecto, **FastAPI** usa un chequeo estricto del header `Content-Type` para request bodies JSON, esto significa que las requests JSON deben incluir un header `Content-Type` válido (p. ej. `application/json`) para que el request body se parse como JSON. ## Riesgo de CSRF { #csrf-risk }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:12:26 GMT 2026 - 3.4K bytes - Click Count (0) -
docs/fr/docs/environment-variables.md
* `C:\Program Files\Python312` * `C:\Windows\System32` //// Lorsque vous tapez une **commande** dans le terminal, le système d'exploitation **cherche** le programme dans **chacun de ces répertoires** listés dans la variable d'environnement `PATH`. Par exemple, lorsque vous tapez `python` dans le terminal, le système d'exploitation cherche un programme nommé `python` dans le **premier répertoire** de cette liste.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:37:13 GMT 2026 - 9.1K bytes - Click Count (0) -
docs/zh/docs/advanced/strict-content-type.md
# 严格的 Content-Type 检查 { #strict-content-type-checking } 默认情况下,FastAPI 对 JSON 请求体使用严格的 `Content-Type` 头检查。这意味着,JSON 请求必须包含有效的 `Content-Type` 头(例如 `application/json`),其请求体才会被按 JSON 解析。 ## CSRF 风险 { #csrf-risk } 此默认行为在一个非常特定的场景下,可防御一类跨站请求伪造(CSRF)攻击。 这类攻击利用了浏览器的一个事实:当请求满足以下条件时,浏览器允许脚本在不进行任何 CORS 预检的情况下直接发送请求: - 没有 `Content-Type` 头(例如使用 `fetch()` 携带 `Blob` 作为 body) - 且不发送任何认证凭据。 这种攻击主要在以下情况下相关: - 应用在本地(如 `localhost`)或内网中运行Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:29:48 GMT 2026 - 3K bytes - Click Count (0) -
docs/en/docs/advanced/strict-content-type.md
# Strict Content-Type Checking { #strict-content-type-checking } By default, **FastAPI** uses strict `Content-Type` header checking for JSON request bodies, this means that JSON requests **must** include a valid `Content-Type` header (e.g. `application/json`) in order for the body to be parsed as JSON. ## CSRF Risk { #csrf-risk } This default behavior provides protection against a class of **Cross-Site Request Forgery (CSRF)** attacks in a very specific scenario.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Mon Feb 23 17:45:20 GMT 2026 - 3.2K bytes - Click Count (0) -
docs/de/docs/advanced/strict-content-type.md
# Strikte Content-Type-Prüfung { #strict-content-type-checking } Standardmäßig verwendet **FastAPI** eine strikte Prüfung des `Content-Type`-Headers für JSON-Requestbodys. Das bedeutet, dass JSON-Requests einen gültigen `Content-Type`-Header (z. B. `application/json`) enthalten MÜSSEN, damit der Body als JSON geparst wird. ## CSRF-Risiko { #csrf-risk }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:48:21 GMT 2026 - 3.6K bytes - Click Count (0) -
docs/ko/docs/advanced/strict-content-type.md
# 엄격한 Content-Type 확인 { #strict-content-type-checking } 기본적으로 **FastAPI**는 JSON 요청 본문에 대해 엄격한 `Content-Type` 헤더 검사를 사용합니다. 이는 JSON 요청의 본문을 JSON으로 파싱하려면 유효한 `Content-Type` 헤더(예: `application/json`)를 반드시 포함해야 함을 의미합니다. ## CSRF 위험 { #csrf-risk } 이 기본 동작은 매우 특정한 시나리오에서 **Cross-Site Request Forgery (CSRF)** 공격의 한 유형에 대한 보호를 제공합니다. 이러한 공격은 브라우저가 다음과 같은 경우 CORS 사전 요청(preflight) 검사를 수행하지 않고 스크립트가 요청을 보내도록 허용한다는 점을 악용합니다:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:56:39 GMT 2026 - 4K bytes - Click Count (0)