1,712 results found (page 2 of 115)
https://spark.apache.org/security.html

Security | Apache Spark Security Model For information on what security properties to expect from Apache Spark and how to configure the various security features, see the Spark Security documentation. Reporting security issues Apache Spark uses the standard process outlined by th…

https://rclone.org/docs

Documentation Usage Rclone is a command line program to manage files on cloud storage. After and install , continue here to learn how to use it: Initial configuration what the basic syntax looks like, describes the various subcommands , the various options and more. Configure Fir…

http://rclone.org/docs

Usage Rclone is a command line program to manage files on cloud storage. After download and install , continue here to learn how to use it: Initial configuration , what the basic syntax looks like, describes the various subcommands , the various options , and more. Configure Firs…

https://d3fend.mitre.org

D3FEND Matrix | MITRE D3FEND™ D3FEND A knowledge graph of cybersecurity countermeasures 1.4.0 T1001 - Data Obfuscation T1001.001 - Junk Data T1001.002 - Steganography T1001.003 - Protocol or Service Impersonation T1002 - Data Compressed* T1003 - OS Credential Dumping T1003.001 - …

https://attack.mitre.org/versions/v17/techniques/T1547/001

Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, Sub-technique T1547.001 - Enterprise | MITRE ATT&CK® Currently viewing ATT&CK v17.1 which was live between April 22, 2025 and October 27, 2025. Learn more about the versioning system or see the live site Techn…

https://sds.ccs.uky.edu

Software Search Software Documentation Service Software Resource Containers Description AI Tags AI Research Discipline AI Software Type Documentation, Uses, and more abricate lcc 1.0 Mass screening of contigs for antimicrobial resistance or virulence genes. It comes bundled with …