Sort Score
Result 10 results
Languages All
Labels All
Results 771 - 780 of 2,750 for

report generation

(0.25 sec)
  1. HmacKeyGenParams - Web APIs | MDN

    Learn about the HmacKeyGenParams interface, including its properties, code examples, specifications, and browser compatibility....generateKey() , when generating a key for the HMAC algorithm...View this page on GitHub • Report a problem with this content...

    developer.mozilla.org/en-US/docs/Web/API/HmacKe...
  2. Export annotations and retrieve document pages ...

    post. Tagged with net, annotator, api, image.... Report Abuse Most recent monthly release...blocking this person and/or reporting abuse DEV Community Dropdown...

    dev.to/groupdocs/export-annotations-and-retriev...
  3. Inserting Images Dynamically | Documentation

    How to dynamically inserted image within your template...can insert images to your reports dynamically using image tags...the assembler method to generate report like following code snippets:...

    docs.groupdocs.com/assembly/java/inserting-imag...
  4. Export annotations and retrieve document pages ...

    post. Tagged with net, annotator, api, image.... Report Abuse Most recent monthly release...blocking this person and/or reporting abuse DEV Community Dropdown...

    dev.to/groupdocs/export-annotations-and-retriev...
  5. Add Metadata Signatures to PDF Documents using ...

    post. Tagged with java, api, esignature, pdf.... Report Abuse Adding and searching...blocking this person and/or reporting abuse DEV Community Dropdown...

    dev.to/groupdocs/add-metadata-signatures-to-pdf...
  6. Cryptographic hash function - MDN Web Docs Glos...

    A cryptographic hash function, also sometimes called a digest function, is a cryptographic primitive transforming a message of arbitrary size into a message of fixed size, called a digest. Cryptographic hash functions are used for authentication, digital signatures, and message authentication codes....compute (because they are generated frequently) not invertible... and only brute-force can generate a message that leads to a...

    developer.mozilla.org/en-US/docs/Glossary/Crypt...
  7. Challenge-response authentication - MDN Web Doc...

    In security protocols, a challenge is some data sent to the client by the server in order to generate a different response each time. Challenge-response protocols are one way to fight against replay attacks where an attacker listens to the previous messages and resends them at a later time to get the same credentials as the original message....by the server in order to generate a different response each...View this page on GitHub • Report a problem with this content...

    developer.mozilla.org/en-US/docs/Glossary/Chall...
  8. Permissions-Policy: gyroscope - HTTP | MDN

    The HTTP Permissions-Policy header gyroscope directive controls whether the current document is allowed to gather information about the orientation of the device through the Gyroscope interface....Specifications Specification Generic Sensor API # permissions-policy...View this page on GitHub • Report a problem with this content...

    developer.mozilla.org/en-US/docs/Web/HTTP/Heade...
  9. Advanced Usage | Documentation

    Learn about GroupDocs.Assembly advanced usage and its multiple powerful features from the guides below....with List Reports - Bulleted Working with Chart Reports - Bubble...Bubble Working with Chart Reports - Filtered Ordered Grouped Working...

    docs.groupdocs.com/assembly/java/advanced-usage/
  10. Synthetic monitoring - MDN Web Docs Glossary: D...

    Synthetic monitoring involves monitoring the performance of a page in a 'laboratory' environment, typically with automation tooling in an environment that is as consistent as possible....through a web application, reporting back the performance of the...but rather synthetically generated traffic collecting data on...

    developer.mozilla.org/en-US/docs/Glossary/Synth...