Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 284 for securely (0.1 sec)

  1. guava/src/com/google/common/io/RecursiveDeleteOption.java

    @J2ObjCIncompatible // java.nio.file
    @ElementTypesAreNonnullByDefault
    public enum RecursiveDeleteOption {
      /**
       * Specifies that the recursive delete should not throw an exception when it can't be guaranteed
       * that it can be done securely, without vulnerability to race conditions (i.e. when the file
       * system does not support {@link SecureDirectoryStream}).
       *
       * <p><b>Warning:</b> On a file system that supports symbolic links, it is possible for an
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Thu Oct 31 16:07:00 UTC 2024
    - 2K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/io/RecursiveDeleteOption.java

    @J2ObjCIncompatible // java.nio.file
    @ElementTypesAreNonnullByDefault
    public enum RecursiveDeleteOption {
      /**
       * Specifies that the recursive delete should not throw an exception when it can't be guaranteed
       * that it can be done securely, without vulnerability to race conditions (i.e. when the file
       * system does not support {@link SecureDirectoryStream}).
       *
       * <p><b>Warning:</b> On a file system that supports symbolic links, it is possible for an
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Thu Oct 31 16:07:00 UTC 2024
    - 2K bytes
    - Viewed (0)
  3. SECURITY.md

    # Using TensorFlow Securely
    
    This document discusses the TensorFlow security model. It describes the security
    risks to consider when using models, checkpoints or input data for training or
    serving. We also provide guidelines on what constitutes a vulnerability in
    TensorFlow and how to report them.
    
    This document applies to other repositories in the TensorFlow organization,
    covering security practices for the entirety of the TensorFlow ecosystem.
    
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  4. docs/en/docs/deployment/https.md

    The domains are securely verified and the certificates are generated automatically. This also allows automating the renewal of these certificates.
    
    The idea is to automate the acquisition and renewal of these certificates so that you can have **secure HTTPS, for free, forever**.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 12K bytes
    - Viewed (0)
  5. architecture/ambient/ztunnel.md

      * Explicitly opting into behavioral changes can be acceptable. For example, introducing Istio multi-cluster semantics.
    * Ensure traffic between mesh workloads is securely encrypted with an Istio identity.
    * Be lightweight enough to not limit adoption.
      * This puts a much tighter budget on CPU, memory, latency, and throughput requirements than traditional Istio sidecars.
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Jul 17 23:10:17 UTC 2024
    - 16.8K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/io/Files.java

       *
       * @return the newly-created directory
       * @throws IllegalStateException if the directory could not be created, such as if the system does
       *     not support creating temporary directories securely
       * @deprecated For Android users, see the <a
       *     href="https://developer.android.com/training/data-storage" target="_blank">Data and File
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Jul 22 19:03:12 UTC 2024
    - 33.1K bytes
    - Viewed (0)
  7. guava/src/com/google/common/io/Files.java

       *
       * @return the newly-created directory
       * @throws IllegalStateException if the directory could not be created, such as if the system does
       *     not support creating temporary directories securely
       * @deprecated For Android users, see the <a
       *     href="https://developer.android.com/training/data-storage" target="_blank">Data and File
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Jul 22 19:03:12 UTC 2024
    - 33.1K bytes
    - Viewed (0)
  8. docs/en/docs/tutorial/security/oauth2-jwt.md

    ```Python hl_lines="8  49  56-57  60-61  70-76"
    {!> ../../docs_src/security/tutorial004_an_py310.py!}
    ```
    
    ////
    
    //// tab | Python 3.9+
    
    ```Python hl_lines="8  49  56-57  60-61  70-76"
    {!> ../../docs_src/security/tutorial004_an_py39.py!}
    ```
    
    ////
    
    //// tab | Python 3.8+
    
    ```Python hl_lines="8  50  57-58  61-62  71-77"
    {!> ../../docs_src/security/tutorial004_an.py!}
    ```
    
    ////
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Oct 26 11:45:10 UTC 2024
    - 12.8K bytes
    - Viewed (0)
  9. docs/en/docs/tutorial/security/simple-oauth2.md

    ```
    
    ## Recap
    
    You now have the tools to implement a complete security system based on `username` and `password` for your API.
    
    Using these tools, you can make the security system compatible with any database and with any user or data model.
    
    The only detail missing is that it is not actually "secure" yet.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 12.3K bytes
    - Viewed (0)
  10. docs/en/docs/how-to/conditional-openapi.md

    ## About security, APIs, and docs
    
    Hiding your documentation user interfaces in production *shouldn't* be the way to protect your API.
    
    That doesn't add any extra security to your API, the *path operations* will still be available where they are.
    
    If there's a security flaw in your code, it will still exist.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Mon Oct 28 11:21:54 UTC 2024
    - 2.3K bytes
    - Viewed (0)
Back to top