Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
180,033 results
In this video we explore the concepts of MACs. We first explore why Hashing alone is not enough, which leads us into the ...
37,949 views
1 year ago
In this video, Microsoft Entra ID Program Manager Stuart Kwan explains the basic concepts and fundamental workings of ...
271,163 views
6 years ago
Confused about API authentication? In this video, we break down OAuth, JWT, and API Keys, explaining when and why to use ...
364,953 views
Hello friends! Welcome to my channel. My name is Abhishek Sharma. #abhics789 If you learned something new do like and share ...
276,100 views
Data Integrity seeks to assure that data has not been modified in transit between a sender and receiver. This assurance is ...
81,483 views
4 years ago
Abroad Education Channel : https://www.youtube.com/channel/UC9sgREj-cfZipx65BLiHGmw Company Specific HR Mock ...
210,442 views
Award acceptance speech by Srinivas Devadas (MIT).
850 views
This is one of the many videos in the mini-series of HTTPS ...
9,905 views
2 years ago
This video consists of easy to understand introductions to IAM (Identity and Access Management) and AAA (Authentication, ...
11,723 views
3 years ago
In this video, we dive into API Authentication, covering why it's essential, how it secures API access, and four common methods: ...
326,053 views
Identity and Access Management is one of the most important topics for anyone working with Azure. Today we will discuss the ...
250,741 views
5 years ago
Secrets, keys, and identity—oh my! Learn how to lock down your Azure Function App with Key Vault secrets, identity-based ...
2,171 views
10 months ago
Answering the question: "How does cell phone encryption work?" This video covers security in wireless and mobile networks, ...
3,748 views
More exclusive content: https://productioncoder.com/you-decide-what-we-build-next Twitter: https://twitter.com/_jgoebel Blog: ...
88,057 views
Ethan from ComTech explains the best practices for setting up Multi-Factor Authentication (MFA) to secure your accounts.
666 views
Authentication is a critical aspect of information security, and various methods are employed to verify the identity of users, systems, ...
749 views
In this video we are going to build a secure Node.js user authentication system. I will be covering all of the security concerns that ...
571,997 views
Get Source Code by Supporting on Patreon: https://patreon.com/CodingDroplets Blazor Tutorial Series Playlist link: ...
83,738 views
Security can be tricky, especially when comes to serverless. Azure App Service Auth (also referred to as “Easy Auth”) does ...
7,949 views
Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...
331,581 views
8 years ago