ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

55 results

Chrome for Developers
From security as opt-in to security by default | Session

Spectre impacted the security landscape of the web significantly. In this Session, we talk about some of the security headers best ...

15:30
From security as opt-in to security by default | Session

2,524 views

4 years ago

FINOS
Exploring AI, Cybersecurity, and Open Source Chris Lindsey, Mend.io - Open Source in Finance Podcast

... in software development and application security, providing insights into secure coding practices, the critical role of open source ...

35:13
Exploring AI, Cybersecurity, and Open Source Chris Lindsey, Mend.io - Open Source in Finance Podcast

163 views

1 year ago

Chrome for Developers
Sign-in form best practice

Use built-in, cross-platform browser features to create sign-in forms that are secure, accessible and easy to use. Resource(s): ...

20:20
Sign-in form best practice

113,370 views

5 years ago

Chrome for Developers
Learn Web Security with Google (Google I/O '17)

Every year we warn close to a million webmasters about their sites being hacked. As a developer, knowing security best practices ...

31:58
Learn Web Security with Google (Google I/O '17)

16,624 views

8 years ago

Confreaks
RubyConf 2015 - Using Ruby In Security Critical Applications by Tom Macklin

Using Ruby In Security Critical Applications by Tom Macklin We've worked to improve security in MRI for a variety of security ...

35:36
RubyConf 2015 - Using Ruby In Security Critical Applications by Tom Macklin

1,320 views

10 years ago

DEFCONConference
Bruce Schneier - Information Security in the Public Interest - DEF CON 27 Conference

Computer security is now a public policy issue. Election security, blockchain, "going dark," the vulnerabilities equities debate, IoT ...

42:48
Bruce Schneier - Information Security in the Public Interest - DEF CON 27 Conference

5,065 views

6 years ago

Software Preservation Network
Episode 4: Working with Source Code and Software Licenses

In the fourth episode in our seven-part series about using the Code of Best Practices in Fair Use, you'll learn speakers explore ...

1:01:07
Episode 4: Working with Source Code and Software Licenses

83 views

6 years ago

DEFCONConference
DEF CON 29 - Mars Cheng, Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems

Diversified Industrial Control System (ICS) providers create a variety of ecosystems, which have come to operate silently in the ...

42:19
DEF CON 29 - Mars Cheng, Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems

2,488 views

4 years ago

Alex Demko
How to Build a Server with Python! 🔥

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:05
How to Build a Server with Python! 🔥

196 views

7 months ago

Computing for All
Web Application Security

By: Dr. A. Murli M.Rao, IGNOU.

1:01:06
Web Application Security

1,663 views

6 years ago

Alex Demko
Sharing Your App? Watch Out for That .env File! ⚠️

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:07
Sharing Your App? Watch Out for That .env File! ⚠️

135 views

7 months ago

Codegram
Best Practices on building a UI component library for your company (David Wells) - FSF 2016

Learn how to building an internal component library & style guide can help your company ship and iterate faster. This talk will ...

44:20
Best Practices on building a UI component library for your company (David Wells) - FSF 2016

14,322 views

9 years ago

Alex Demko
Simple Tips to Secure Your Frontend Applications 🔐

Don't miss this essential guide to frontend security Curious about how simple code injections can compromise your whole ...

18:28
Simple Tips to Secure Your Frontend Applications 🔐

138 views

3 months ago

Alex Demko
Stuck on Authorization? JWT to the Rescue! 🛟🔐

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:07
Stuck on Authorization? JWT to the Rescue! 🛟🔐

186 views

7 months ago

Alex Demko
Don’t Roll Your Own Crypto — Here’s Why! 🧠🚫

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:10
Don’t Roll Your Own Crypto — Here’s Why! 🧠🚫

174 views

7 months ago

Alex Demko
What Is JWT? Let’s Break It Down! 🔐

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:04
What Is JWT? Let’s Break It Down! 🔐

242 views

7 months ago

Alex Demko
What’s a Python Virtual Environment? Find Out Now! 🐍🧪

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:06
What’s a Python Virtual Environment? Find Out Now! 🐍🧪

145 views

7 months ago

Alex Demko
How Apps Know It's You Sending the Request! 🔍

Struggling to understand how JWT authorization works in Python? In this video, I'll show you how to implement JWT-based ...

0:07
How Apps Know It's You Sending the Request! 🔍

521 views

7 months ago

Alex Demko
Hacker Submits Your Form?! 😱

Don't miss this essential guide to frontend security Curious about how simple code injections can compromise your whole ...

0:15
Hacker Submits Your Form?! 😱

275 views

3 months ago

Wisc-Online
Records Management  An Introduction to Filing Rules and Indexing

In this screencast, learners read an explanation of the file rules and indexing that have been developed by the Association of ...

7:53
Records Management An Introduction to Filing Rules and Indexing

119,320 views

6 years ago