 2021 中国开源年度报告various brush-up behavior, open source project owners need to pay more attention to the quality, compliance and other issues brought about by the increase in student contributors. 杨丽蕴:我国开源人才后备力量足、基数大。 source courses. We hope the follow-up can be achieved in the learning of computers, compiling principles, software engineering, and other theoretical knowledge at the same time so that students learn extremely active and occupying five of the top 10 seats. 2.8 开源安全与合规 Open Source Security and Compliance 2.8.1 CVE 漏洞风险 CVE Vulnerability Risks Gitee 采用棱镜七彩 FossEye 静态扫描了 1.5 万 个 Gitee 平台上具有代表性的优质推荐开0 码力 | 199 页 | 9.63 MB | 1 年前3 2021 中国开源年度报告various brush-up behavior, open source project owners need to pay more attention to the quality, compliance and other issues brought about by the increase in student contributors. 杨丽蕴:我国开源人才后备力量足、基数大。 source courses. We hope the follow-up can be achieved in the learning of computers, compiling principles, software engineering, and other theoretical knowledge at the same time so that students learn extremely active and occupying five of the top 10 seats. 2.8 开源安全与合规 Open Source Security and Compliance 2.8.1 CVE 漏洞风险 CVE Vulnerability Risks Gitee 采用棱镜七彩 FossEye 静态扫描了 1.5 万 个 Gitee 平台上具有代表性的优质推荐开0 码力 | 199 页 | 9.63 MB | 1 年前3
 Weblate 4.2 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer inside. Security by Design Principles Any code for Weblate should be written with Security by Design Principles [https://wiki.owasp.org/index.php/Security_by_Design_Principles] in mind. Coding standard0 码力 | 648 页 | 9.34 MB | 1 年前3 Weblate 4.2 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer inside. Security by Design Principles Any code for Weblate should be written with Security by Design Principles [https://wiki.owasp.org/index.php/Security_by_Design_Principles] in mind. Coding standard0 码力 | 648 页 | 9.34 MB | 1 年前3
 Weblate 4.2.1 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer inside. Security by Design Principles Any code for Weblate should be written with Security by Design Principles [https://wiki.owasp.org/index.php/Security_by_Design_Principles] in mind. Coding standard0 码力 | 650 页 | 9.34 MB | 1 年前3 Weblate 4.2.1 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer inside. Security by Design Principles Any code for Weblate should be written with Security by Design Principles [https://wiki.owasp.org/index.php/Security_by_Design_Principles] in mind. Coding standard0 码力 | 650 页 | 9.34 MB | 1 年前3
 Weblate 4.2.2 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer inside. Security by Design Principles Any code for Weblate should be written with Security by Design Principles [https://wiki.owasp.org/index.php/Security_by_Design_Principles] in mind. Coding standard0 码力 | 650 页 | 9.34 MB | 1 年前3 Weblate 4.2.2 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer inside. Security by Design Principles Any code for Weblate should be written with Security by Design Principles [https://wiki.owasp.org/index.php/Security_by_Design_Principles] in mind. Coding standard0 码力 | 650 页 | 9.34 MB | 1 年前3
 Weblate 4.3 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer inside. Security by Design Principles Any code for Weblate should be written with Security by Design Principles [https://wiki.owasp.org/index.php/Security_by_Design_Principles] in mind. Coding standard0 码力 | 667 页 | 9.36 MB | 1 年前3 Weblate 4.3 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer inside. Security by Design Principles Any code for Weblate should be written with Security by Design Principles [https://wiki.owasp.org/index.php/Security_by_Design_Principles] in mind. Coding standard0 码力 | 667 页 | 9.36 MB | 1 年前3
 Weblate 4.3.2 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer inside. Security by Design Principles Any code for Weblate should be written with Security by Design Principles [https://wiki.owasp.org/index.php/Security_by_Design_Principles] in mind. Coding standard0 码力 | 676 页 | 9.37 MB | 1 年前3 Weblate 4.3.2 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer inside. Security by Design Principles Any code for Weblate should be written with Security by Design Principles [https://wiki.owasp.org/index.php/Security_by_Design_Principles] in mind. Coding standard0 码力 | 676 页 | 9.37 MB | 1 年前3
 Weblate 4.3.1 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer inside. Security by Design Principles Any code for Weblate should be written with Security by Design Principles [https://wiki.owasp.org/index.php/Security_by_Design_Principles] in mind. Coding standard0 码力 | 667 页 | 9.36 MB | 1 年前3 Weblate 4.3.1 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer inside. Security by Design Principles Any code for Weblate should be written with Security by Design Principles [https://wiki.owasp.org/index.php/Security_by_Design_Principles] in mind. Coding standard0 码力 | 667 页 | 9.36 MB | 1 年前3
 Weblate 4.2.1 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer how Weblate looks from inside. 3.3.1 Security by Design Principles Any code for Weblate should be written with Security by Design Principles in mind. 3.3.2 Coding standard The code should follow PEP-80 码力 | 411 页 | 4.60 MB | 1 年前3 Weblate 4.2.1 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer how Weblate looks from inside. 3.3.1 Security by Design Principles Any code for Weblate should be written with Security by Design Principles in mind. 3.3.2 Coding standard The code should follow PEP-80 码力 | 411 页 | 4.60 MB | 1 年前3
 Weblate 4.2.2 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer how Weblate looks from inside. 3.3.1 Security by Design Principles Any code for Weblate should be written with Security by Design Principles in mind. 3.3.2 Coding standard The code should follow PEP-80 码力 | 411 页 | 4.60 MB | 1 年前3 Weblate 4.2.2 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer how Weblate looks from inside. 3.3.1 Security by Design Principles Any code for Weblate should be written with Security by Design Principles in mind. 3.3.2 Coding standard The code should follow PEP-80 码力 | 411 页 | 4.60 MB | 1 年前3
 Weblate 4.2 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer how Weblate looks from inside. 3.3.1 Security by Design Principles Any code for Weblate should be written with Security by Design Principles in mind. 3.3.2 Coding standard The code should follow PEP-80 码力 | 410 页 | 4.56 MB | 1 年前3 Weblate 4.2 用户文档information, however, end users are responsible for ensuring such compliance. The Hosted Weblate service has not been audited for compliance with ITAR or other export controls, and does not currently offer how Weblate looks from inside. 3.3.1 Security by Design Principles Any code for Weblate should be written with Security by Design Principles in mind. 3.3.2 Coding standard The code should follow PEP-80 码力 | 410 页 | 4.56 MB | 1 年前3
共 179 条
- 1
- 2
- 3
- 4
- 5
- 6
- 18














 
 