ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

103 results

The Coding Gopher
99% of Developers Don't Get Sockets

Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher ⬆️ Best project-based coding platform.

12:05
99% of Developers Don't Get Sockets

479,435 views

8 months ago

SreenuTech
Spring Boot (Complete Course in 16 Hours) Part-1 | By Mr. Sreenivas

About Sreenu Technologies: Sreenu Technologies has established in 2013 May. We are experts on Java Realtime Project ...

5:05:39
Spring Boot (Complete Course in 16 Hours) Part-1 | By Mr. Sreenivas

45,310 views

3 years ago

SreenuTech
JAVA Security Scanning Tool (Snyk) | By Mr. Sreenivas

About Sreenu Technologies: Sreenu Technologies has established in 2013 May. We are experts on Java Realtime Project ...

48:16
JAVA Security Scanning Tool (Snyk) | By Mr. Sreenivas

6,344 views

3 years ago

OktaDev
Okta Authorization Servers for OpenID Connect and OAuth 2.0 Integrations

This video explains the two types of OAuth 2.0 authorization servers Okta provides and gives you tips on how to create and debug ...

17:23
Okta Authorization Servers for OpenID Connect and OAuth 2.0 Integrations

30,993 views

3 years ago

DevDojo Academy
Spring Boot 2.3 Essentials 11 - Spring Data JPA with MySQL pt 02

Spring Boot Essentials is the course you were looking for if you never had contact with Spring Boot before. In this tutorial like ...

9:15
Spring Boot 2.3 Essentials 11 - Spring Data JPA with MySQL pt 02

787 views

5 years ago

Mike Day Concrete (Everything About Concrete)
How To Epoxy Coat Your Garage Floor | Must Watch For Diy'rs

Epoxygaragefloor #Garagefloorepoxy #Mikedayconcrete LEARN HOW TO EPOXY YOUR OWN GARAGE FLOOR HERE: ...

8:59
How To Epoxy Coat Your Garage Floor | Must Watch For Diy'rs

1,837,619 views

5 years ago

DevDojo Academy
SpringBoot 2.3 Essentials 15 - Exception Handling pt 03 - @Transactional

More info and contact: http://devdojo.academy Source code: https://github.com/devdojoacademy/springboot2-essentials ...

8:20
SpringBoot 2.3 Essentials 15 - Exception Handling pt 03 - @Transactional

722 views

5 years ago

Red Hat Developer
Readiness Liveness Probes

In this video, the user learns how to configure Readiness and Liveness probes to monitor service health.

6:50
Readiness Liveness Probes

654 views

4 years ago

SreenuTech
Spring Cloud with Microservices (Complete Course in 15hrs) Part-1 | By Mr. Sreenivas

About Sreenu Technologies: Sreenu Technologies has established in 2013 May. We are experts on Java Realtime Project ...

4:53:01
Spring Cloud with Microservices (Complete Course in 15hrs) Part-1 | By Mr. Sreenivas

9,751 views

3 years ago

SreenuTech
Angular Course (Topics - Security & Performance)  | By Mr. Ranjan

About Sreenu Technologies: Sreenu Technologies has established in 2013 May. We are experts on Java Realtime Project ...

2:40:09
Angular Course (Topics - Security & Performance) | By Mr. Ranjan

4,902 views

3 years ago

Nobody
Offensive Security 2013 - FSU - Lecture5: Reverse Engineering (x86) Workshop Day 1

This is the 5th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...

1:15:56
Offensive Security 2013 - FSU - Lecture5: Reverse Engineering (x86) Workshop Day 1

21,300 views

12 years ago

Howard Abrams
Demonstration of demo-it

A demonstration of my Emacs demonstration tool, demo-it, given at the PDX Emacs Hacker night. Sorry that the recording just cuts ...

24:16
Demonstration of demo-it

4,094 views

9 years ago

OWASP Foundation
Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong - AppSecUSA 2017

Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong According to the 2016 Verizon Data Breach ...

46:05
Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong - AppSecUSA 2017

1,240 views

8 years ago

Gain Java Knowledge
Spring Boot Transaction Management With Propagation

Hi Friends, #GainJavaKnowledge Welcome to this channel Gain Java Knowledge. In this video we will discuss what is ...

27:39
Spring Boot Transaction Management With Propagation

24,127 views

5 years ago

The Linux Foundation
Mitigating (Some) Use-after-frees in the Linux Kernel - Jann Horn, Google

Mitigating (Some) Use-after-frees in the Linux Kernel - Jann Horn, Google.

45:30
Mitigating (Some) Use-after-frees in the Linux Kernel - Jann Horn, Google

1,069 views

5 years ago

DEFCONConference
DEF CON 30  - Jake Labelle - Doing the Impossible - How I Found Mainframe Buffer Overflows

Mainframes run the world, literally. Have you ever paid for something, a mainframe was involved, flown? Used a bank? Gone to ...

38:52
DEF CON 30 - Jake Labelle - Doing the Impossible - How I Found Mainframe Buffer Overflows

1,649 views

3 years ago

SreenuTech
Spring MVC & Spring Restful Webservices (Part-1) | by Mr. Sreenivas

About Sreenu Technologies: Sreenu Technologies has established in 2013 May. We are experts on Java Realtime Project ...

6:19:25
Spring MVC & Spring Restful Webservices (Part-1) | by Mr. Sreenivas

16,548 views

3 years ago

The Linux Foundation
Where is my Code Vulnerable: Matching CVEs and Source Code - David A. Barrett & Peter Shin

Where is my Code Vulnerable: Matching CVEs and Source Code - David A. Barrett & Peter Shin, Canvass Labs Surprisingly, often ...

32:50
Where is my Code Vulnerable: Matching CVEs and Source Code - David A. Barrett & Peter Shin

458 views

6 years ago

SecDim
Smart Contract/dApp/Web3 Security: Under the hood of int overflow

dApp security is a whole new world where we should re-learn and change our perspective on security concepts. In this workshop ...

1:19:41
Smart Contract/dApp/Web3 Security: Under the hood of int overflow

207 views

Streamed 3 years ago

Nobody
Offensive Security 2013 - FSU - Lecture4: Rootkits / Code Auditing

This is the 4th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...

1:07:37
Offensive Security 2013 - FSU - Lecture4: Rootkits / Code Auditing

7,407 views

12 years ago