ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

224 results

Chrome for Developers
Learn Web Security with Google (Google I/O '17)

Every year we warn close to a million webmasters about their sites being hacked. As a developer, knowing security best practices ...

31:58
Learn Web Security with Google (Google I/O '17)

16,624 views

8 years ago

Chrome for Developers
From security as opt-in to security by default | Session

Spectre impacted the security landscape of the web significantly. In this Session, we talk about some of the security headers best ...

15:30
From security as opt-in to security by default | Session

2,524 views

4 years ago

Chrome for Developers
Security 101 (Chrome University 2019)

Welcome to Chrome University, where you will learn the foundations of how Chrome works. Explore this deep dive about how ...

28:33
Security 101 (Chrome University 2019)

4,946 views

5 years ago

Chrome for Developers
Security 201 (Chrome University 2019)

Welcome to Chrome University, where you will learn the foundations of how Chrome works. Are we really attacked? Yes.

38:09
Security 201 (Chrome University 2019)

4,236 views

5 years ago

FINOS
Exploring AI, Cybersecurity, and Open Source Chris Lindsey, Mend.io - Open Source in Finance Podcast

... in software development and application security, providing insights into secure coding practices, the critical role of open source ...

35:13
Exploring AI, Cybersecurity, and Open Source Chris Lindsey, Mend.io - Open Source in Finance Podcast

164 views

1 year ago

Chrome for Developers
Sign-in form best practice

Use built-in, cross-platform browser features to create sign-in forms that are secure, accessible and easy to use. Resource(s): ...

20:20
Sign-in form best practice

113,380 views

5 years ago

Confreaks
RubyConf 2015 - Using Ruby In Security Critical Applications by Tom Macklin

Using Ruby In Security Critical Applications by Tom Macklin We've worked to improve security in MRI for a variety of security ...

35:36
RubyConf 2015 - Using Ruby In Security Critical Applications by Tom Macklin

1,320 views

10 years ago

Maxim Masiutin
Information Security Terminology - Lecture 01/16 - Core Concepts and Terminology

0:00 Lecture 1: Core Concepts and Terminology in Information Security 0:15 Introduction 1:21 Part 1: Information Security vs.

25:33
Information Security Terminology - Lecture 01/16 - Core Concepts and Terminology

35 views

3 days ago

Computing for All
Web Application Security

By: Dr. A. Murli M.Rao, IGNOU.

1:01:06
Web Application Security

1,663 views

6 years ago

aantonop
Bitcoin Q&A: Optional Passphrases (Advanced Security Feature) and Seed Storage

Do optional passphrases protect against leaks or compromises of mnemonic seed words? Why are brain wallets usually insecure ...

14:14
Bitcoin Q&A: Optional Passphrases (Advanced Security Feature) and Seed Storage

74,781 views

7 years ago

OWASP LATAM
Continuous Security, Building Security into your Pipelines - OWASP LATAM@Home 2021

Vandana Verma.

21:14
Continuous Security, Building Security into your Pipelines - OWASP LATAM@Home 2021

147 views

4 years ago

GoDaddy
The Ultimate WordPress Security Guide for Your Blog | The Journey

Whether you'd like to sell more products or are just looking for a way to make money from home, blogging is a great option.

5:56
The Ultimate WordPress Security Guide for Your Blog | The Journey

1,117 views

4 years ago

Alex Demko
Secure Authorization with JWT in FastAPI 🔐 | Theory & Practice (2025 Guide)

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

30:20
Secure Authorization with JWT in FastAPI 🔐 | Theory & Practice (2025 Guide)

149 views

8 months ago

Agrici Daniel
Build $1,000 Websites in Minutes with Gemini 3 & AI Studio (No Code!)

I just built a professional website in under 10 minutes using Gemini 3 and AI Studio (no coding required). This method ...

9:05
Build $1,000 Websites in Minutes with Gemini 3 & AI Studio (No Code!)

10,572 views

2 months ago

SiliconANGLE theCUBE
What Developers Need to Know About the EU Cyber Resilience Act | AppDevANGLE

The European software market is projected to reach $166.5 billion USD by 2025, and with the EU Cyber Resilience Act (CRA) ...

20:36
What Developers Need to Know About the EU Cyber Resilience Act | AppDevANGLE

1,539 views

9 months ago

GoDaddy
5 Cybersecurity Tips for Your Small Business | The Journey

As a small business owner, you are an expert on your products and services. No one expects that you're a master of web security, ...

8:26
5 Cybersecurity Tips for Your Small Business | The Journey

3,050 views

4 years ago

GoDaddy
Top Security Tips to Build a Trusted Website | The Journey

Top security tips to Build a Trusted Website. Check out more The Journey content at https://bit.ly/GDTheJourney. Learning how to ...

8:14
Top Security Tips to Build a Trusted Website | The Journey

6,665 views

6 years ago

GoDaddy
7 Small Business Network Security Tips | The Journey

7 Small Business Network Security Tips. Check out more The Journey content at https://bit.ly/GDTheJourney. Have you ever had ...

6:22
7 Small Business Network Security Tips | The Journey

9,460 views

6 years ago

Rafiq Bouhsen
21.Blockchain Security: Introduction to Blockchain Security vs. Standard Cybersecurity

A) The Environment One of the primary differences between cybersecurity in a traditional computing environment and on the ...

4:00
21.Blockchain Security: Introduction to Blockchain Security vs. Standard Cybersecurity

56 views

4 years ago

NPTEL IIT Guwahati
Lec 29: Review-Based Code Testing

Design & Implementation of Human-Computer Interfaces URL: https://onlinecourses.nptel.ac.in/noc22_cs125/preview Prof.

27:07
Lec 29: Review-Based Code Testing

3,027 views

3 years ago

DEFCONConference
Bruce Schneier - Information Security in the Public Interest - DEF CON 27 Conference

Computer security is now a public policy issue. Election security, blockchain, "going dark," the vulnerabilities equities debate, IoT ...

42:48
Bruce Schneier - Information Security in the Public Interest - DEF CON 27 Conference

5,065 views

6 years ago

Chrome for Developers
What's new in Chrome OS I/O 2022

To watch this keynote interpreted in American Sign Language (ASL), please click here → https://goo.gle/3w6P9uF Learn about ...

23:41
What's new in Chrome OS I/O 2022

3,270,427 views

3 years ago

Milestone Systems
Cybersecurity: Threats and solutions

Carsten Bøgelund, Product Security Manager at Milestone talks about the latest trends and threats of cybersecurity. There are ...

9:44
Cybersecurity: Threats and solutions

331 views

4 years ago

aantonop
Bitcoin Q&A: Multi-signature and Distributed Storage

What happens when wallets (personal or at an exchange) are hacked? What is "sweeping" with regards to private keys? After a ...

17:58
Bitcoin Q&A: Multi-signature and Distributed Storage

19,617 views

7 years ago

Codegram
Best Practices on building a UI component library for your company (David Wells) - FSF 2016

Learn how to building an internal component library & style guide can help your company ship and iterate faster. This talk will ...

44:20
Best Practices on building a UI component library for your company (David Wells) - FSF 2016

14,323 views

9 years ago