GNU Image Manipulation Program User Manual 2.4
GNU Image Manipulation Program 1 / 653 GNU Image Manipulation Program User Manual GNU Image Manipulation Program 2 / 653 Copyright © 2002, 2003, 2004, 2005, 2006, 2007 The GIMP Documentation Team the section enphrased GNU Free Documentation License. GNU Image Manipulation Program 3 / 653 COLLABORATORS TITLE : REFERENCE : GNU Image Manipulation Program ACTION NAME DATE SIGNATURE WRITTEN BY 2007 REVISION HISTORY NUMBER DATE DESCRIPTION NAME $Revision: 1985 $ 2007-07-15 romanofski GNU Image Manipulation Program 4 / 653 Contents I Getting started 21 1 Introduction 22 1.1 Welcome to the0 码力 | 653 页 | 19.93 MB | 1 年前3GNU Image Manipulation Program User Manual 2.10
GNU Image Manipulation Program User Manual November 17, 2021 GNU Image Manipulation Program Copyright © 2002-2021 The GIMP Documentation Team Legal Notice Permission is granted to copy, distribute Toolbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.2.2 Image Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.2.3 Dialogs . . . . . . . . 26 3.4.2 Change the Size of an Image for the screen . . . . . . . . . . . . . . . . . . . . . . . 26 3.4.3 Change the Size of an Image for print . . . . . . . . . . . . . . . . . . .0 码力 | 1070 页 | 44.54 MB | 1 年前3Vitess security audit
PRESENTS Vitess security audit In collaboration with the Vitess maintainers, Open Source Technology Improvement Fund and The Linux Foundation Authors Adam KorczynskiDavid Korczynski com> Date: June 5, 2023 This report is licensed under Creative Commons 4.0 (CC BY 4.0) Vitess Security Audit, 2023 Table of contents Table of contents 1 Executive summary 2 Notable findings 3 Project found 16 SLSA review 38 Conclusions 40 1 Vitess Security Audit, 2023 Executive summary In March and April 2023, Ada Logics carried out a security audit of Vitess. The primary focus of the audit was 0 码力 | 41 页 | 1.10 MB | 1 年前3Istio Security Assessment
Istio Security Assessment Google August 6, 2020 – Version 1.1 Prepared for Arun Kumar R Prepared by Mark Manning Jeff Dileo Divya Natesan Andy Olsen Feedback on this project? https://my.nccgroup assessment was to identify security issues related to the Istio code base, highlight high risk configurations commonly used by administrators, and provide perspective on whether security features sufficiently subsequent phases of the assessment. A test plan was created which matched areas of code with specific security controls (e.g. service discovery, certificate lifecycle, side car injection) to focus testing efforts0 码力 | 51 页 | 849.66 KB | 1 年前3firebird metadata security ru
получении запроса на соединение процесс сервера удостоверяет пользователя по базе данных безопасности (security database). После успешного удостоверения сервер разрешает приложению (пользователю) произвести безопасности, то даже хорошее шифрование становится немного больше, чем “безопасностью по неясности” (security by obscurity). 4.2.2. Ограничение распространения данных Некоторые просят шифровать данные базы “безопасности по неясности” Предлагаются и различные другие формы “безопасности по неясности” (security by obscurity). Например, специальные события, возникающие в моменты входа/подключения и отключения0 码力 | 21 页 | 156.51 KB | 1 年前3A Security Guide for Kotlin Developers
A Security Guide for otlin Developers I N D E X Overview..................................................................1 Kotlin’s Security Profile............................................2 Most Common Security Attacks...............................3 Top Kotlin Security Risk...........................................5 OWASP Mobile TOP 10 Mobile Risks..........................10 Protect developers and other key decision makers in software security and software supply chain vulnerabilities with information regarding the top security risks they can expect to face — from inherent weaknesses0 码力 | 13 页 | 1.80 MB | 1 年前3Firebird File and Metadata Security
Firebird File and Metadata Security Geoff Worboys Version 0.6, 30 June 2020 Table of Contents 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 7. Acceptable Low Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . page and don’t know about Firebird, see this link: www.firebirdsql.org This article discusses the security of Firebird database files and in particular access to the metadata stored in those files. It has0 码力 | 19 页 | 115.27 KB | 1 年前3firebird metadata security de
0 码力 | 20 页 | 127.60 KB | 1 年前3Security Beyond Memory Safety
C and C++: A Security Perspective Security Beyond Memory Safety Using Modern C++ to Avoid Vulnerabilities by DesignMax Hoffmann Security Beyond Memory Safety CppCon 2024 2 Security Beyond Memory Safety Hoffmann Security Beyond Memory Safety CppCon 2024 3 FIFTY SHADES OF SHOOTING YOURSELF IN THE FOOT WITH A RAILGUNMax Hoffmann Security Beyond Memory Safety CppCon 2024 4Max Hoffmann Security Beyond yearsMax Hoffmann Security Beyond Memory Safety CppCon 2024 6Max Hoffmann Security Beyond Memory Safety CppCon 2024 7Max Hoffmann Security Beyond Memory Safety CppCon 2024 8Max Hoffmann Security Beyond Memory0 码力 | 79 页 | 4.15 MB | 5 月前3Embracing an Adversarial Mindset for Cpp Security
Embracing an Adversarial Mindset for C++ Security Amanda Rousseau 9/18/2024 This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY1 Strategies for Secure C++ DevelopmentWHOAMI 0x401006 Microsoft 0x40100C Offensive 0x40100F Research & Security 0x401018 Engineering 0x40101A (MORSE) CURRENT 0x401000 MALWARE UNICORN AMANDA ROUSSEAU 0x402001 perspectiveFactors Influencing Trends Increased Security Awareness and Practices Adoption of Modern Technologies •secure coding, regular patching, comprehensive security testing •Improved Discovery Methods -0 码力 | 92 页 | 3.67 MB | 5 月前3
共 1000 条
- 1
- 2
- 3
- 4
- 5
- 6
- 100