- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 2,267 for protect (1.28 sec)
-
docs/erasure/README.md
## Why is Erasure Code useful?
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 4.2K bytes - Viewed (0) -
docs/en/docs/how-to/conditional-openapi.md
## About security, APIs, and docs { #about-security-apis-and-docs } Hiding your documentation user interfaces in production *shouldn't* be the way to protect your API. That doesn't add any extra security to your API, the *path operations* will still be available where they are. If there's a security flaw in your code, it will still exist.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 2.4K bytes - Viewed (0) -
docs/en/overrides/main.html
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 15:19:49 UTC 2025 - 4.5K bytes - Viewed (0) -
guava/src/com/google/common/collect/JdkBackedImmutableMultiset.java
import java.util.Collection; import java.util.Map; import org.jspecify.annotations.Nullable; /** * An implementation of ImmutableMultiset backed by a JDK Map and a list of entries. Used to protect * against hash flooding attacks. * * @author Louis Wasserman */ @GwtCompatible final class JdkBackedImmutableMultiset<E> extends ImmutableMultiset<E> { private final Map<E, Integer> delegateMap;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue Apr 08 13:05:15 UTC 2025 - 3.2K bytes - Viewed (0) -
README.md
[](https://www.bestpractices.dev/projects/7197) Guava is a set of core Java libraries from Google that includes new collection types (such as multimap and multiset), immutable collections, a graph library, and utilities for concurrency, I/O, hashing, primitives, strings, and more! It is widely used on most Java projects within Google, and widely used by many
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue Aug 05 15:30:14 UTC 2025 - 6.2K bytes - Viewed (0) -
SECURITY.md
the security issue. By default MinIO will **not** publish this information to protect your privacy. This process can take some time, especially when coordination is required with maintainers of other projects. Every effort will be made to handle the bug in as timely a manner as possible, however it's important that we
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sat Feb 12 00:51:25 UTC 2022 - 2.2K bytes - Viewed (0) -
LICENSE
it. And you must show them these terms so they know their rights. We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library. To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Mon Jan 18 20:25:38 UTC 2016 - 25.8K bytes - Viewed (0) -
src/main/java/jcifs/smb1/http/NtlmServlet.java
import jcifs.smb1.smb1.SmbAuthException; import jcifs.smb1.smb1.SmbSession; import jcifs.smb1.util.Base64; /** * This servlet may be used with pre-2.3 servlet containers * to protect content with NTLM HTTP Authentication. Servlets that * extend this abstract base class may be authenticatied against an SMB * server or domain controller depending on how the
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/InterruptibleTask.java
* InterruptibleChannel and JavaLangAccess.blockedOn(Thread, Interruptible), it isn't * predictable what work might be done. (e.g., close a file and flush buffers to disk). To * protect ourselves from this, we park ourselves and tell our interrupter that we did so. */ if (state == PARKED || compareAndSet(state, PARKED)) { // Interrupting Cow Says: // ______
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 10K bytes - Viewed (0) -
SECURITY.md
which could allow them to execute arbitrary code on the system running TensorFlow. It is important to keep TensorFlow up to date with the latest security patches and follow the sandboxing guideline above to protect against these types of vulnerabilities. ## Security properties of execution modes TensorFlow has several execution modes, with Eager-mode being the default in v2.
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0)