ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

56 results

Chrome for Developers
From security as opt-in to security by default | Session

Spectre impacted the security landscape of the web significantly. In this Session, we talk about some of the security headers best ...

15:30
From security as opt-in to security by default | Session

2,524 views

4 years ago

FINOS
Exploring AI, Cybersecurity, and Open Source Chris Lindsey, Mend.io - Open Source in Finance Podcast

... in software development and application security, providing insights into secure coding practices, the critical role of open source ...

35:13
Exploring AI, Cybersecurity, and Open Source Chris Lindsey, Mend.io - Open Source in Finance Podcast

163 views

1 year ago

Chrome for Developers
Sign-in form best practice

Use built-in, cross-platform browser features to create sign-in forms that are secure, accessible and easy to use. Resource(s): ...

20:20
Sign-in form best practice

113,368 views

5 years ago

Chrome for Developers
Learn Web Security with Google (Google I/O '17)

Every year we warn close to a million webmasters about their sites being hacked. As a developer, knowing security best practices ...

31:58
Learn Web Security with Google (Google I/O '17)

16,624 views

8 years ago

DEFCONConference
Bruce Schneier - Information Security in the Public Interest - DEF CON 27 Conference

Computer security is now a public policy issue. Election security, blockchain, "going dark," the vulnerabilities equities debate, IoT ...

42:48
Bruce Schneier - Information Security in the Public Interest - DEF CON 27 Conference

5,065 views

6 years ago

Confreaks
RubyConf 2015 - Using Ruby In Security Critical Applications by Tom Macklin

Using Ruby In Security Critical Applications by Tom Macklin We've worked to improve security in MRI for a variety of security ...

35:36
RubyConf 2015 - Using Ruby In Security Critical Applications by Tom Macklin

1,320 views

10 years ago

Software Preservation Network
Episode 4: Working with Source Code and Software Licenses

In the fourth episode in our seven-part series about using the Code of Best Practices in Fair Use, you'll learn speakers explore ...

1:01:07
Episode 4: Working with Source Code and Software Licenses

83 views

6 years ago

DEFCONConference
DEF CON 29 - Mars Cheng, Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems

Diversified Industrial Control System (ICS) providers create a variety of ecosystems, which have come to operate silently in the ...

42:19
DEF CON 29 - Mars Cheng, Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems

2,488 views

4 years ago

Alex Demko
How to Build a Server with Python! 🔥

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:05
How to Build a Server with Python! 🔥

196 views

7 months ago

Computing for All
Web Application Security

By: Dr. A. Murli M.Rao, IGNOU.

1:01:06
Web Application Security

1,663 views

6 years ago

Alex Demko
Sharing Your App? Watch Out for That .env File! ⚠️

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:07
Sharing Your App? Watch Out for That .env File! ⚠️

135 views

7 months ago

Codegram
Best Practices on building a UI component library for your company (David Wells) - FSF 2016

Learn how to building an internal component library & style guide can help your company ship and iterate faster. This talk will ...

44:20
Best Practices on building a UI component library for your company (David Wells) - FSF 2016

14,322 views

9 years ago

Creators Eye
For C# developers Protect your source code

you are a C# developer want to protect your source code from crackers or challengers here we mad for you a course to join it ...

0:42
For C# developers Protect your source code

589 views

5 years ago

Alex Demko
Simple Tips to Secure Your Frontend Applications 🔐

Don't miss this essential guide to frontend security Curious about how simple code injections can compromise your whole ...

18:28
Simple Tips to Secure Your Frontend Applications 🔐

138 views

3 months ago

Alex Demko
Stuck on Authorization? JWT to the Rescue! 🛟🔐

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:07
Stuck on Authorization? JWT to the Rescue! 🛟🔐

186 views

7 months ago

Alex Demko
What Is JWT? Let’s Break It Down! 🔐

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:04
What Is JWT? Let’s Break It Down! 🔐

242 views

7 months ago

Alex Demko
Don’t Roll Your Own Crypto — Here’s Why! 🧠🚫

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:10
Don’t Roll Your Own Crypto — Here’s Why! 🧠🚫

174 views

7 months ago

Alex Demko
What’s a Python Virtual Environment? Find Out Now! 🐍🧪

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:06
What’s a Python Virtual Environment? Find Out Now! 🐍🧪

145 views

7 months ago

Alex Demko
How Apps Know It's You Sending the Request! 🔍

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:07
How Apps Know It's You Sending the Request! 🔍

521 views

7 months ago

Wisc-Online
Records Management  An Introduction to Filing Rules and Indexing

In this screencast, learners read an explanation of the file rules and indexing that have been developed by the Association of ...

7:53
Records Management An Introduction to Filing Rules and Indexing

119,319 views

6 years ago

Alex Demko
Hacker Submits Your Form?! 😱

Don't miss this essential guide to frontend security Curious about how simple code injections can compromise your whole ...

0:15
Hacker Submits Your Form?! 😱

275 views

3 months ago

Alex Demko
Secure Authorization with JWT in FastAPI 🔐 | Theory & Practice (2025 Guide)

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

30:20
Secure Authorization with JWT in FastAPI 🔐 | Theory & Practice (2025 Guide)

149 views

7 months ago

OWASP LATAM
Continuous Security, Building Security into your Pipelines - OWASP LATAM@Home 2021

Vandana Verma.

21:14
Continuous Security, Building Security into your Pipelines - OWASP LATAM@Home 2021

146 views

4 years ago

IPFS
NFT x IPFS Best Practices with Yusef Napora

Yusef Napora, Protocol Labs software engineer, covered NFT x IPFS best practices, and introduced us to Minty at this month's ...

14:31
NFT x IPFS Best Practices with Yusef Napora

732 views

4 years ago

Alex Demko
Your API Key Isn't Secret! 🔑

Don't miss this essential guide to frontend security Curious about how simple code injections can compromise your whole ...

0:37
Your API Key Isn't Secret! 🔑

825 views

3 months ago