ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

56 results

Chrome for Developers
From security as opt-in to security by default | Session

Spectre impacted the security landscape of the web significantly. In this Session, we talk about some of the security headers best ...

15:30
From security as opt-in to security by default | Session

2,524 views

4 years ago

FINOS
Exploring AI, Cybersecurity, and Open Source Chris Lindsey, Mend.io - Open Source in Finance Podcast

... in software development and application security, providing insights into secure coding practices, the critical role of open source ...

35:13
Exploring AI, Cybersecurity, and Open Source Chris Lindsey, Mend.io - Open Source in Finance Podcast

163 views

1 year ago

Chrome for Developers
Sign-in form best practice

Use built-in, cross-platform browser features to create sign-in forms that are secure, accessible and easy to use. Resource(s): ...

20:20
Sign-in form best practice

113,370 views

5 years ago

Chrome for Developers
Learn Web Security with Google (Google I/O '17)

Every year we warn close to a million webmasters about their sites being hacked. As a developer, knowing security best practices ...

31:58
Learn Web Security with Google (Google I/O '17)

16,624 views

8 years ago

Confreaks
RubyConf 2015 - Using Ruby In Security Critical Applications by Tom Macklin

Using Ruby In Security Critical Applications by Tom Macklin We've worked to improve security in MRI for a variety of security ...

35:36
RubyConf 2015 - Using Ruby In Security Critical Applications by Tom Macklin

1,320 views

10 years ago

DEFCONConference
Bruce Schneier - Information Security in the Public Interest - DEF CON 27 Conference

Computer security is now a public policy issue. Election security, blockchain, "going dark," the vulnerabilities equities debate, IoT ...

42:48
Bruce Schneier - Information Security in the Public Interest - DEF CON 27 Conference

5,065 views

6 years ago

Software Preservation Network
Episode 4: Working with Source Code and Software Licenses

In the fourth episode in our seven-part series about using the Code of Best Practices in Fair Use, you'll learn speakers explore ...

1:01:07
Episode 4: Working with Source Code and Software Licenses

83 views

6 years ago

DEFCONConference
DEF CON 29 - Mars Cheng, Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems

Diversified Industrial Control System (ICS) providers create a variety of ecosystems, which have come to operate silently in the ...

42:19
DEF CON 29 - Mars Cheng, Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems

2,488 views

4 years ago

Alex Demko
How to Build a Server with Python! 🔥

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:05
How to Build a Server with Python! 🔥

196 views

7 months ago

Computing for All
Web Application Security

By: Dr. A. Murli M.Rao, IGNOU.

1:01:06
Web Application Security

1,663 views

6 years ago

Alex Demko
Sharing Your App? Watch Out for That .env File! ⚠️

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:07
Sharing Your App? Watch Out for That .env File! ⚠️

135 views

7 months ago

Codegram
Best Practices on building a UI component library for your company (David Wells) - FSF 2016

Learn how to building an internal component library & style guide can help your company ship and iterate faster. This talk will ...

44:20
Best Practices on building a UI component library for your company (David Wells) - FSF 2016

14,322 views

9 years ago

Alex Demko
Simple Tips to Secure Your Frontend Applications 🔐

Don't miss this essential guide to frontend security Curious about how simple code injections can compromise your whole ...

18:28
Simple Tips to Secure Your Frontend Applications 🔐

138 views

3 months ago

Alex Demko
Stuck on Authorization? JWT to the Rescue! 🛟🔐

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:07
Stuck on Authorization? JWT to the Rescue! 🛟🔐

186 views

7 months ago

Alex Demko
Don’t Roll Your Own Crypto — Here’s Why! 🧠🚫

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:10
Don’t Roll Your Own Crypto — Here’s Why! 🧠🚫

174 views

7 months ago

Alex Demko
What Is JWT? Let’s Break It Down! 🔐

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:04
What Is JWT? Let’s Break It Down! 🔐

242 views

7 months ago

Chrome for Developers
Security 201 (Chrome University 2019)

Welcome to Chrome University, where you will learn the foundations of how Chrome works. Are we really attacked? Yes.

38:09
Security 201 (Chrome University 2019)

4,236 views

5 years ago

Alex Demko
What’s a Python Virtual Environment? Find Out Now! 🐍🧪

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:06
What’s a Python Virtual Environment? Find Out Now! 🐍🧪

145 views

7 months ago

Alex Demko
How Apps Know It's You Sending the Request! 🔍

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:07
How Apps Know It's You Sending the Request! 🔍

521 views

7 months ago

Alex Demko
Hacker Submits Your Form?! 😱

Don't miss this essential guide to frontend security Curious about how simple code injections can compromise your whole ...

0:15
Hacker Submits Your Form?! 😱

275 views

3 months ago