Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 1,676 for tentang (0.06 sec)

  1. docs/es/docs/advanced/testing-dependencies.md

    Sebastián Ramírez <******@****.***> 1735583217 +0000
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Dec 30 18:26:57 UTC 2024
    - 2.4K bytes
    - Viewed (0)
  2. docs/pt/docs/advanced/testing-events.md

    Sebastián Ramírez <******@****.***> 1731896744 +0100
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 296 bytes
    - Viewed (0)
  3. docs/pt/docs/how-to/testing-database.md

    Guilherme Rameh <******@****.***> 1729253044 -0300
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Fri Oct 18 12:04:04 UTC 2024
    - 547 bytes
    - Viewed (0)
  4. docs/em/docs/advanced/testing-dependencies.md

    Sebastián Ramírez <******@****.***> 1731896744 +0100
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 1.7K bytes
    - Viewed (0)
  5. docs/de/docs/advanced/testing-dependencies.md

    Sebastián Ramírez <******@****.***> 1731896744 +0100
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 2.8K bytes
    - Viewed (0)
  6. docs/pt/docs/advanced/testing-dependencies.md

    Sebastián Ramírez <******@****.***> 1731896744 +0100
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 2.5K bytes
    - Viewed (0)
  7. docs/tr/docs/advanced/testing-websockets.md

    Sebastián Ramírez <******@****.***> 1731896744 +0100
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 451 bytes
    - Viewed (0)
  8. docs/pt/docs/advanced/security/http-basic-auth.md

    ### Ataques de Temporização
    
    Mas o que é um "timing attack" (ataque de temporização)?
    
    Vamos imaginar que alguns invasores estão tentando adivinhar o usuário e a senha.
    
    E eles enviam uma requisição com um usuário `johndoe` e uma senha `love123`.
    
    Então o código Python em sua aplicação seria equivalente a algo como:
    
    ```Python
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 5.1K bytes
    - Viewed (0)
  9. SECURITY.md

    TensorFlow in a multitenant design mixes the risks described above with the
    inherent ones from multitenant configurations. The primary areas of concern are
    tenant isolation, resource allocation, model sharing and hardware attacks.
    
    ### Tenant isolation
    
    Since any tenants or users providing models, graphs or checkpoints can execute
    code in context of the TensorFlow service, it is important to design isolation
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  10. src/main/resources/fess_indices/fess/es/stopwords.txt

    siendo
    sido
    tengo
    tienes
    tiene
    tenemos
    tenéis
    tienen
    tenga
    tengas
    tengamos
    tengáis
    tengan
    tendré
    tendrás
    tendrá
    tendremos
    tendréis
    tendrán
    tendría
    tendrías
    tendríamos
    tendríais
    tendrían
    tenía
    tenías
    teníamos
    teníais
    tenían
    tuve
    tuviste
    tuvo
    tuvimos
    tuvisteis
    tuvieron
    tuviera
    tuvieras
    tuviéramos
    tuvierais
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Mon Nov 27 12:59:36 UTC 2023
    - 2.2K bytes
    - Viewed (0)
Back to top