积分充值
 首页
前端开发
AngularDartElectronFlutterHTML/CSSJavaScriptReactSvelteTypeScriptVue.js构建工具
后端开发
.NetC#C++C语言DenoffmpegGoIdrisJavaJuliaKotlinLeanMakefilenimNode.jsPascalPHPPythonRISC-VRubyRustSwiftUML其它语言区块链开发测试微服务敏捷开发架构设计汇编语言
数据库
Apache DorisApache HBaseCassandraClickHouseFirebirdGreenplumMongoDBMySQLPieCloudDBPostgreSQLRedisSQLSQLiteTiDBVitess数据库中间件数据库工具数据库设计
系统运维
AndroidDevOpshttpdJenkinsLinuxPrometheusTraefikZabbix存储网络与安全
云计算&大数据
Apache APISIXApache FlinkApache KarafApache KyuubiApache OzonedaprDockerHadoopHarborIstioKubernetesOpenShiftPandasrancherRocketMQServerlessService MeshVirtualBoxVMWare云原生CNCF机器学习边缘计算
综合其他
BlenderGIMPKiCadKritaWeblate产品与服务人工智能亿图数据可视化版本控制笔试面试
文库资料
前端
AngularAnt DesignBabelBootstrapChart.jsCSS3EchartsElectronHighchartsHTML/CSSHTML5JavaScriptJerryScriptJestReactSassTypeScriptVue前端工具小程序
后端
.NETApacheC/C++C#CMakeCrystalDartDenoDjangoDubboErlangFastifyFlaskGinGoGoFrameGuzzleIrisJavaJuliaLispLLVMLuaMatplotlibMicronautnimNode.jsPerlPHPPythonQtRPCRubyRustR语言ScalaShellVlangwasmYewZephirZig算法
移动端
AndroidAPP工具FlutterFramework7HarmonyHippyIoniciOSkotlinNativeObject-CPWAReactSwiftuni-appWeex
数据库
ApacheArangoDBCassandraClickHouseCouchDBCrateDBDB2DocumentDBDorisDragonflyDBEdgeDBetcdFirebirdGaussDBGraphGreenPlumHStreamDBHugeGraphimmudbIndexedDBInfluxDBIoTDBKey-ValueKitDBLevelDBM3DBMatrixOneMilvusMongoDBMySQLNavicatNebulaNewSQLNoSQLOceanBaseOpenTSDBOracleOrientDBPostgreSQLPrestoDBQuestDBRedisRocksDBSequoiaDBServerSkytableSQLSQLiteTiDBTiKVTimescaleDBYugabyteDB关系型数据库数据库数据库ORM数据库中间件数据库工具时序数据库
云计算&大数据
ActiveMQAerakiAgentAlluxioAntreaApacheApache APISIXAPISIXBFEBitBookKeeperChaosChoerodonCiliumCloudStackConsulDaprDataEaseDC/OSDockerDrillDruidElasticJobElasticSearchEnvoyErdaFlinkFluentGrafanaHadoopHarborHelmHudiInLongKafkaKnativeKongKubeCubeKubeEdgeKubeflowKubeOperatorKubernetesKubeSphereKubeVelaKumaKylinLibcloudLinkerdLonghornMeiliSearchMeshNacosNATSOKDOpenOpenEBSOpenKruiseOpenPitrixOpenSearchOpenStackOpenTracingOzonePaddlePaddlePolicyPulsarPyTorchRainbondRancherRediSearchScikit-learnServerlessShardingSphereShenYuSparkStormSupersetXuperChainZadig云原生CNCF人工智能区块链数据挖掘机器学习深度学习算法工程边缘计算
UI&美工&设计
BlenderKritaSketchUI设计
网络&系统&运维
AnsibleApacheAWKCeleryCephCI/CDCurveDevOpsGoCDHAProxyIstioJenkinsJumpServerLinuxMacNginxOpenRestyPrometheusServertraefikTrafficUnixWindowsZabbixZipkin安全防护系统内核网络运维监控
综合其它
文章资讯
 上传文档  发布文章  登录账户
IT文库
  • 综合
  • 文档
  • 文章

无数据

分类

全部综合其他(43)Weblate(42)后端开发(6)系统运维(4)Linux(3)云计算&大数据(3)Rust(3)Kotlin(2)产品与服务(1)Istio(1)

语言

全部中文(简体)(56)

格式

全部PDF文档 PDF(34)其他文档 其他(22)
 
本次搜索耗时 0.069 秒,为您找到相关结果约 56 个.
  • 全部
  • 综合其他
  • Weblate
  • 后端开发
  • 系统运维
  • Linux
  • 云计算&大数据
  • Rust
  • Kotlin
  • 产品与服务
  • Istio
  • 全部
  • 中文(简体)
  • 全部
  • PDF文档 PDF
  • 其他文档 其他
  • 默认排序
  • 最新排序
  • 页数排序
  • 大小排序
  • 全部时间
  • 最近一天
  • 最近一周
  • 最近一个月
  • 最近三个月
  • 最近半年
  • 最近一年
  • pdf文档 2021 中国开源年度报告

    over 93% were not at risk for CVE vulnerabilities. 其中,在所有存在 CVE 漏洞风险的项目中,存在一个 CVE 漏洞的占比为 18.51%,存在超 过 10 个 CVE 漏洞的占比 2.58%。 Of the projects with CVE vulnerabilities, 18.51% have one CVE vulnerability vulnerability, and 2.58% have more than 10 CVE vulnerabilities. 2.8.3 开源合规情况 Open Source Compliance Gitee 采用棱镜七彩 FossEye 扫描了 1.5 万 个 Gitee 平台上具有代表性的优质推荐开源项 目仓库,结果显示有超过 95% 不存在直接 License 冲突风险。 Gitee 旦被广泛使用,一方面漏洞信息散落在各类开发者手中,能否及时被官方收录是一个挑战;同 时另一方面,如果软件使用者跟踪漏洞修复不及时,则其被攻击的风险将大大提升。 Security risks arising from vulnerabilities in open source components are also an essential element of open source risk that cannot be
    0 码力 | 199 页 | 9.63 MB | 1 年前
    3
  • pdf文档 大学霸 Kali Linux 安全渗透教程

    (3)在该界面设置扫描的名称,这里设置为Local Vulnerabilities。对于Base选择 Empty,static and fast复选框,该选项允许用户从零开始并创建自己的配置。然后 单击Create Scan Config按钮,将会看到新建的配置,如图5.34所示。 图5.34 新建的Local Vulnerabilities (4)从该界面可以看到新建的Local Vulnerabilities,要编辑该配置可以单击 新建Target界面 在该界面输入Target名称及扫描的主机。然后单击Create Target按钮,将显示如图 5.38所示的界面。 图5.38 新建的目标 从该界面可以看到新建的Local Vulnerabilities目标。 3. 新建任务 在OpenVAS的菜单栏中依次选择Scan Management|New Task命令,将显示如图 5.39所示的界面。 大学霸 Kali Linux 安全渗透教程 列表中。目标主机的 漏洞指定是从评估中获得的信息。本小节将介绍使用OpenVAS来扫描用户指定本地 目标系统上的漏洞。扫描本地漏洞的具体操作步骤如下所示。 (1)新建名为Local Vulnerabilities的Scan Config。 (2)添加扫描的类型,所需扫描类型如表5-4所示。 表5-4 扫描的类型 Compliance 扫描Compliance漏洞 Default Accounts
    0 码力 | 444 页 | 25.79 MB | 1 年前
    3
  • pdf文档 简谈 Rust 与国密 TLS - 王江桐

    China • Empirical Study:“You Really Shouldn’t Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries”,MIT; • 对于8个大型、通用、开源的 C 与 C++ 密码库进行调研; • 现有的问题在于: • 密码库导致的一些 Problems of Cryptography Systems Rust China Conf 2022 – 2023, Shanghai, China • 数据来源于 OpenSSL 页面 Vulnerabilities 以及 CVE Details,截止 至2023.6.3,统计 2020 – 2023 近四年的 OpenSSL 相关安全漏 洞: • 内存安全问题包括解引用空指针、缓冲区溢出、内存损坏,占总问题 org/wiki/Transport_Layer_Security • «You Really Shouldn’t Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries» ,Blessing Jenny, Specter Michael A., Weitzner Danieal J., MIT, arXiv:2107
    0 码力 | 44 页 | 3.70 MB | 1 年前
    3
  • pdf文档 openEuler 21.09 技术白皮书

    directly access host resources and share the host kernel. However, this can cause security vulnerabilities, such as container escapes, making common containers insufficient for most security isolation Resources such as account passwords and file permissions can be hardened to improve resistance to vulnerabilities. OS security is enabled by default. • Lightweight containers: The lightweight container runtime OpenJDK community editions, performs strict analysis and control, and applies patches to CVE vulnerabilities as and when needed. • Open source: BiSheng JDK provides releases and open source code, and continuously
    0 码力 | 36 页 | 3.40 MB | 1 年前
    3
  • pdf文档 openEuler 21.03 技术白皮书

    smooth expansion of system capacity • Live kernel upgrade: quick, hitless fixes of kernel vulnerabilities Cloud base: • iSula: iSulad supports local volume management. isula-build incorporates functions openEuler platform. Rather than QEMU, which is heavily coded and targeted by frequent CVE vulnerabilities, new Rust-based virtualization architectures and components, such as CrosVM, FireCracker, and OpenJDK community editions, performs strict analysis and control, and applies patches to CVE vulnerabilities as and when needed. 4. Open source: It provides free and open sourced code. Feature Description
    0 码力 | 21 页 | 948.66 KB | 1 年前
    3
  • pdf文档 宋净超 从开源 Istio 到企业级服务:如何在企业中落地服务网格

    consume ● Do I run on a problematic Istio version ● Features ○ Control plane report ○ Security vulnerabilities ○ Config scanning ● GitHub Envoy Gateway ● API standarization ● Support Kubernetes Gateway
    0 码力 | 30 页 | 4.79 MB | 6 月前
    3
  • pdf文档 运维上海 2017-采用Harbor开源企业级Registry实现高效安全的镜像运维 -张海宁

    pushing – Image is pulled using digest • Perform vulnerability scanning – Prevent images with vulnerabilities from being pulled – Regular scanning based on updated vulnerability database 21 Content trust
    0 码力 | 41 页 | 4.94 MB | 1 年前
    3
  • pdf文档 Weblate 4.5.1 用户文档

    ://bestpractices.coreinfrastructure.org/ projects/552>‘_。 3.12.1 Tracking dependencies for vulnerabilities We do monitor security issues in our dependencies using Dependabot. This covers Python and JavaScript libraries and latest stable release should have adjusted dependencies to avoid vulnerabilities. 提示: There might be vulnerabilities in third-party libraries which do not affect Weblate, and we do not address Docker 容器安全 The Docker containers are scanned using Anchore and Trivy. This allows us to detect vulnerabilities early and release an updated version of the container containing fixes. You can get the results
    0 码力 | 424 页 | 4.53 MB | 1 年前
    3
  • pdf文档 Weblate 4.5 用户文档

    ://bestpractices.coreinfrastructure.org/ projects/552>‘_。 3.12.1 Tracking dependencies for vulnerabilities We do monitor security issues in our dependencies using Dependabot. This covers Python and JavaScript libraries and latest stable release should have adjusted dependencies to avoid vulnerabilities. 提示: There might be vulnerabilities in third-party libraries which do not affect Weblate, and we do not address Docker 容器安全 The Docker containers are scanned using Anchore and Trivy. This allows us to detect vulnerabilities early and release an updated version of the container containing fixes. You can get the results
    0 码力 | 422 页 | 4.54 MB | 1 年前
    3
  • pdf文档 Weblate 4.5.3 用户文档

    ://bestpractices.coreinfrastructure.org/ projects/552>‘_。 3.12.1 Tracking dependencies for vulnerabilities Security issues in our dependencies are monitored using Dependabot. This covers the Python and libraries, and the latest stable release has its dependencies updated to avoid vulnerabilities. 提示: There might be vulnerabilities in third-party libraries which do not affect Weblate, so those are not addressed Docker 容器安全 The Docker containers are scanned using Anchore and Trivy. This allows us to detect vulnerabilities early and release improvements quickly. You can get the results of these scans at GitHub —they
    0 码力 | 431 页 | 4.62 MB | 1 年前
    3
共 56 条
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
前往
页
相关搜索词
2021中国开源年度报告年度报告大学KaliLinux安全渗透教程王江桐202306132023RustChinaConf简谈Rust国密TLSopenEuler21.09技术白皮皮书白皮书21.03宋净超Istio企业企业级服务如何落地网格运维上海2017采用HarborRegistry实现高效镜像海宁张海宁Weblate4.5用户文档用户文档
IT文库
关于我们 文库协议 联系我们 意见反馈 免责声明
本站文档数据由用户上传或本站整理自互联网,不以营利为目的,供所有人免费下载和学习使用。如侵犯您的权益,请联系我们进行删除。
IT文库 ©1024 - 2025 | 站点地图
Powered By MOREDOC AI v3.3.0-beta.70
  • 关注我们的公众号【刻舟求荐】,给您不一样的精彩
    关注我们的公众号【刻舟求荐】,给您不一样的精彩