- Sort Score
- Num 10 results
- Language All
Results 551 - 560 of 1,006 for security2 (0.06 seconds)
-
docs/zh/docs/how-to/general.md
# 通用 - 如何操作 - 诀窍 { #general-how-to-recipes } 这里是一些指向文档中其他部分的链接,用于解答一般性或常见问题。 ## 数据过滤 - 安全性 { #filter-data-security } 为确保不返回超过需要的数据,请阅读 [教程 - 响应模型 - 返回类型](../tutorial/response-model.md) 文档。 ## 优化响应性能 - 响应模型 - 返回类型 { #optimize-response-performance-response-model-return-type } 在返回 JSON 数据时优化性能,请使用返回类型或响应模型,这样 Pydantic 会在 Rust 侧处理到 JSON 的序列化,而无需经过 Python。更多内容请阅读 [教程 - 响应模型 - 返回类型](../tutorial/response-model.md) 文档。Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 17:06:37 GMT 2026 - 2.6K bytes - Click Count (0) -
docs/sts/dex.md
and add relevant policies on MinIO using `mc admin policy create myminio/ <group_name> group-access.json` ## Explore Further - [MinIO STS Quickstart Guide](https://docs.min.io/community/minio-object-store/developers/security-token-service.html)
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 3.8K bytes - Click Count (0) -
docs/de/docs/tutorial/dependencies/dependencies-in-path-operation-decorators.md
Aber in realen Fällen würden Sie bei der Implementierung von Sicherheit mehr Vorteile durch die Verwendung der integrierten [Sicherheits-Werkzeuge (siehe nächstes Kapitel)](../security/index.md) erzielen. /// ## Abhängigkeitsfehler und -Rückgabewerte { #dependencies-errors-and-return-values } Sie können dieselben Abhängigkeits-*Funktionen* verwenden, die Sie normalerweise verwenden.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 3.5K bytes - Click Count (0) -
README.asciidoc
heart of the https://www.elastic.co/products[Elastic Stack]. You can use Elasticsearch to store, search, and manage data for: * Logs * Metrics * A search backend * Application monitoring * Endpoint security \... and more! To learn more about Elasticsearch's features and capabilities, see our https://www.elastic.co/products/elasticsearch[product page]. [[get-started]] == Get started
Created: Wed Apr 08 16:19:15 GMT 2026 - Last Modified: Tue Apr 20 13:32:21 GMT 2021 - 2.6K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/crawler/serializer/DataSerializer.java
/** * Constructs a new DataSerializer. * <p> * Initializes the ThreadLocal Kryo instances with appropriate configuration. * The Kryo instances are configured to require class registration for security, * preventing deserialization of arbitrary classes that could lead to RCE vulnerabilities. * Only explicitly registered classes can be serialized/deserialized. * </p> */ public DataSerializer() {Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sat Jan 10 01:54:09 GMT 2026 - 10.5K bytes - Click Count (3) -
docs/tr/docs/features.md
### Güvenlik ve Kimlik Doğrulama { #security-and-authentication } Güvenlik ve kimlik doğrulama entegredir. Veritabanları veya veri modelleriyle ilgili hiçbir taviz yoktur. OpenAPI’da tanımlanan tüm güvenlik şemaları, şunlar dâhil: * HTTP Basic. * **OAuth2** (ayrıca **JWT token**’larla). Şu eğitime göz atın: [OAuth2 with JWT](tutorial/security/oauth2-jwt.md). * API anahtarları: * Header’larda.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 07:53:17 GMT 2026 - 10.1K bytes - Click Count (0) -
docs/en/docs/release-notes.md
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Apr 03 12:07:04 GMT 2026 - 631K bytes - Click Count (0) -
okhttp/api/android/okhttp.api
public final fun check (Ljava/lang/String;[Ljava/security/cert/Certificate;)V public fun equals (Ljava/lang/Object;)Z public final fun findMatchingPins (Ljava/lang/String;)Ljava/util/List; public final fun getPins ()Ljava/util/Set; public fun hashCode ()I public static final fun pin (Ljava/security/cert/Certificate;)Ljava/lang/String; public static final fun sha1Hash (Ljava/security/cert/X509Certificate;)Lokio/ByteString;
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Mar 10 21:47:20 GMT 2026 - 72.3K bytes - Click Count (0) -
docs/en/docs/advanced/advanced-dependencies.md
These examples are intentionally simple, but show how it all works. In the chapters about security, there are utility functions that are implemented in this same way. If you understood all this, you already know how those utility tools for security work underneath. ///
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 9K bytes - Click Count (0) -
docs/tr/docs/tutorial/dependencies/sub-dependencies.md
Yine de çok güçlüdür ve keyfi derecede derin iç içe geçmiş bağımlılık "graph"ları (ağaçları) tanımlamanıza izin verir. /// tip | İpucu Bu basit örneklerle çok faydalı görünmeyebilir. Ancak **security** ile ilgili bölümlerde bunun ne kadar işe yaradığını göreceksiniz. Ayrıca size ne kadar kod kazandırdığını da göreceksiniz.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Feb 13 12:41:38 GMT 2026 - 4.2K bytes - Click Count (0)