Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
149 results
Spring Boot Essentials is the course you were looking for if you never had contact with Spring Boot before. In this tutorial like ...
787 views
5 years ago
In this video, the user learns how to configure Readiness and Liveness probes to monitor service health.
652 views
4 years ago
To help support me, check out Kite! Kite is a coding assistant that helps you faster, on any IDE offer smart completions and ...
201,889 views
More info and contact: http://devdojo.academy Source code: https://github.com/devdojoacademy/springboot2-essentials ...
722 views
About Sreenu Technologies: Sreenu Technologies has established in 2013 May. We are experts on Java Realtime Project ...
6,327 views
3 years ago
Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong According to the 2016 Verizon Data Breach ...
1,239 views
8 years ago
A demonstration of my Emacs demonstration tool, demo-it, given at the PDX Emacs Hacker night. Sorry that the recording just cuts ...
4,094 views
9 years ago
Mitigating (Some) Use-after-frees in the Linux Kernel - Jann Horn, Google.
1,069 views
This is the 4th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
7,407 views
12 years ago
Mainframes run the world, literally. Have you ever paid for something, a mainframe was involved, flown? Used a bank? Gone to ...
1,648 views
Authors: Jun Xu (Pennsylvania State University), Dongliang Mu (Nanjing University) Ping Chen, Xinyu Xing and Peng Liu ...
387 views
This is the 5th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
21,299 views
This is the 15th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
4,298 views
Where is my Code Vulnerable: Matching CVEs and Source Code - David A. Barrett & Peter Shin, Canvass Labs Surprisingly, often ...
458 views
6 years ago
https://media.ccc.de/v/35c3-9657-from_zero_to_zero_day In this talk I will share my story of how in a little over a year, a high ...
31,802 views
7 years ago
More info: https://videos.didierstevens.com/2022/03/09/quick-dirty-shellcode-analysis-cve-2017-11882/
1,730 views
This is the 16th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
2,093 views
This is the 7th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
10,316 views
Bypassing Many Kernel Protections Using Elastic Objects - Yueqi Chen & Zhepeng Lin, Ph.D. Students.
478 views
From AppSecEU 2016 in Rome https://2016.appsec.eu/ - Managed by the official OWASP Media Project ...
449 views