- Sort Score
- Result 10 results
- Languages All
Results 251 - 260 of 752 for These (0.02 sec)
-
src/main/java/jcifs/netbios/NbtAddress.java
/* * The NodeStatusResponse.readNodeNameArray method may also set this * information. These two places where node status data is populated should * be consistent. Be carefull! */ this.hostName = hostName; this.address = address; this.groupName = groupName;
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 15.1K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
Using these ideas, JWT can be used for way more sophisticated scenarios. In those cases, several of those entities could have the same ID, let's say `foo` (a user `foo`, a car `foo`, and a blog post `foo`).
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0) -
api/maven-api-core/src/main/java/org/apache/maven/api/services/ProjectManager.java
/** * Returns an immutable collection of attached artifacts for the given project. * Attached artifacts are secondary artifacts produced during the build (e.g., sources jar, * javadoc jar, test jars). These artifacts are created and attached during specific * lifecycle phases, so the collection contents depend on the build phase when this method * is called. *
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Thu Jan 30 23:29:13 UTC 2025 - 12K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt
import okhttp3.tls.internal.TlsUtil.newTrustManager /** * Certificates to identify which peers to trust and also to earn the trust of those peers in kind. * Client and server exchange these certificates during the handshake phase of a TLS connection. * * ### Server Authentication * * This is the most common form of TLS authentication: clients verify that servers are trusted and
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sat May 10 11:15:14 UTC 2025 - 8.4K bytes - Viewed (0) -
docs/metrics/prometheus/README.md
### 6. Configure Grafana
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 7.1K bytes - Viewed (0) -
docs/en/docs/tutorial/dependencies/sub-dependencies.md
But still, it is very powerful, and allows you to declare arbitrarily deeply nested dependency "graphs" (trees). /// tip All this might not seem as useful with these simple examples. But you will see how useful it is in the chapters about **security**. And you will also see the amounts of code it will save you.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 3.7K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/util/concurrent/FuturesGetCheckedTest.java
/* * TODO(cpovirk): It would be great to run all these tests (including class unloading) in an * environment that forces Futures.getChecked to its fallback WeakSetValidator. One awful way of * doing so would be to derive a separate test library by using remove_from_jar to strip out * ClassValueValidator. * * Fortunately, we get pretty good coverage "by accident": We run all these tests against the
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Dec 19 18:03:30 UTC 2024 - 16.4K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
/** * An Access Control Entry (ACE) is an element in a security descriptor * such as those associated with files and directories. The Windows OS * determines which users have the necessary permissions to access objects * based on these entries. * <p> * To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 8.8K bytes - Viewed (0) -
doc/asm.html
These modes accept only 1, 2, 4, and 8 as scale factors. </li> </ul> <p> When using the compiler and assembler's <code>-dynlink</code> or <code>-shared</code> modes, any load or store of a fixed memory location such as a global variable must be assumed to overwrite <code>CX</code>. Therefore, to be safe for use with these modes,
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Tue Nov 28 19:15:27 UTC 2023 - 36.3K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/Futures.java
// // Future versions of the JMM may revise safe construction semantics in such a way that we can // safely publish these objects and we won't need this whole discussion. // TODO(user,lukes): consider adding volatile to all these fields since in current known JVMs // that should resolve the issue. This comes at the cost of adding more write barriers to the // implementations.
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 64.3K bytes - Viewed (0)