ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

47 results

Chrome for Developers
From security as opt-in to security by default | Session

Spectre impacted the security landscape of the web significantly. In this Session, we talk about some of the security headers best ...

15:30
From security as opt-in to security by default | Session

2,524 views

4 years ago

Cointelegraph
Smart contracts for beginners, explained (in 6 minutes) | Cryptopedia

We explain what smart contracts are and how they work. #Cointelegraph #crypto #smartcontracts Subscribe to Cointelegraph: ...

6:14
Smart contracts for beginners, explained (in 6 minutes) | Cryptopedia

73,662 views

3 years ago

Chrome for Developers
Learn Web Security with Google (Google I/O '17)

Every year we warn close to a million webmasters about their sites being hacked. As a developer, knowing security best practices ...

31:58
Learn Web Security with Google (Google I/O '17)

16,624 views

8 years ago

DEFCONConference
DEF CON 30 - Mickey Shkatov, Jesse Michael - One Bootloader to Load Them All

Introduced in 2012, Secure Boot - the OG trust in boot - has become a foundational rock in modern computing and is used by ...

52:22
DEF CON 30 - Mickey Shkatov, Jesse Michael - One Bootloader to Load Them All

2,326 views

3 years ago

FINOS
Exploring AI, Cybersecurity, and Open Source Chris Lindsey, Mend.io - Open Source in Finance Podcast

... in software development and application security, providing insights into secure coding practices, the critical role of open source ...

35:13
Exploring AI, Cybersecurity, and Open Source Chris Lindsey, Mend.io - Open Source in Finance Podcast

167 views

1 year ago

Chrome for Developers
Sign-in form best practice

Use built-in, cross-platform browser features to create sign-in forms that are secure, accessible and easy to use. Resource(s): ...

20:20
Sign-in form best practice

113,417 views

5 years ago

DEFCONConference
Bruce Schneier - Information Security in the Public Interest - DEF CON 27 Conference

Computer security is now a public policy issue. Election security, blockchain, "going dark," the vulnerabilities equities debate, IoT ...

42:48
Bruce Schneier - Information Security in the Public Interest - DEF CON 27 Conference

5,067 views

6 years ago

Confreaks
RubyConf 2015 - Using Ruby In Security Critical Applications by Tom Macklin

Using Ruby In Security Critical Applications by Tom Macklin We've worked to improve security in MRI for a variety of security ...

35:36
RubyConf 2015 - Using Ruby In Security Critical Applications by Tom Macklin

1,320 views

10 years ago

DEFCONConference
DEF CON 29 - Mars Cheng, Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems

Diversified Industrial Control System (ICS) providers create a variety of ecosystems, which have come to operate silently in the ...

42:19
DEF CON 29 - Mars Cheng, Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems

2,488 views

4 years ago

Alex Demko
Simple Tips to Secure Your Frontend Applications 🔐

Don't miss this essential guide to frontend security Curious about how simple code injections can compromise your whole ...

18:28
Simple Tips to Secure Your Frontend Applications 🔐

158 views

4 months ago

Software Preservation Network
Episode 4: Working with Source Code and Software Licenses

In the fourth episode in our seven-part series about using the Code of Best Practices in Fair Use, you'll learn speakers explore ...

1:01:07
Episode 4: Working with Source Code and Software Licenses

83 views

6 years ago

Computing for All
Web Application Security

By: Dr. A. Murli M.Rao, IGNOU.

1:01:06
Web Application Security

1,666 views

6 years ago

Creators Eye
For C# developers Protect your source code

you are a C# developer want to protect your source code from crackers or challengers here we mad for you a course to join it ...

0:42
For C# developers Protect your source code

589 views

5 years ago

Codegram
Best Practices on building a UI component library for your company (David Wells) - FSF 2016

Learn how to building an internal component library & style guide can help your company ship and iterate faster. This talk will ...

44:20
Best Practices on building a UI component library for your company (David Wells) - FSF 2016

14,334 views

9 years ago

CodeOps HQ
Setting Up the Perfect Developer Environment on Linux for 2025

Want to learn how to build your own dev tools? Check out CodeCrafters: https://bitly.cx/HFm4 Are you a developer looking to ...

11:58
Setting Up the Perfect Developer Environment on Linux for 2025

348,185 views

1 year ago

Alex Demko
Secure Authorization with JWT in FastAPI 🔐 | Theory & Practice (2025 Guide)

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

30:20
Secure Authorization with JWT in FastAPI 🔐 | Theory & Practice (2025 Guide)

150 views

8 months ago

OWASP LATAM
Continuous Security, Building Security into your Pipelines - OWASP LATAM@Home 2021

Vandana Verma.

21:14
Continuous Security, Building Security into your Pipelines - OWASP LATAM@Home 2021

147 views

4 years ago

Wisc-Online
Records Management  An Introduction to Filing Rules and Indexing

In this screencast, learners read an explanation of the file rules and indexing that have been developed by the Association of ...

7:53
Records Management An Introduction to Filing Rules and Indexing

120,157 views

6 years ago

BSVY
INDIA'S WAR AGAINST CYBER ATTACK AND HACKING 2024,WATCH NOW

India is facing a growing threat from cyber criminals, with hackers and cyber attacks becoming increasingly common. But how is ...

3:13
INDIA'S WAR AGAINST CYBER ATTACK AND HACKING 2024,WATCH NOW

9 views

1 year ago

Bernard Sfez
How to bootstrap a Tiki

In this Tiki Express tutorial we'll review together; The basics about themes, css, modules and Look and Feel panel Review the ...

15:29
How to bootstrap a Tiki

801 views

6 years ago