Packt
Android Security Tweaks
This video talks about a few more settings that you might need to tweak to keep your Android device safe from attacks. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to Cybersecurity...
Debunked
6 Myths Debunked About The Human Body
Just how unique are your fingerprints? Appendix’s purpose? Why aren’t we totally human? How do we really taste things?
Curated Video
The Future of Airport Security | AI + Biometrics
Airport security is moving away from boarding passes and towards facial recognition. What does this mean for you?
Curated Video
Do Deepfakes Have Fingerprints? | Deepfake Detection + GAN Fingerprints
Deepfake detection is hard, but it turns out they might have fingerprints that we can use to separate them from real video!
Curated Video
How to Roll Fingerprints
“How to Roll Fingerprints” will demonstrate to students the correct way to roll fingerprints.
Let's Tute
Why Fingerprints are Unique and Important
This video explains the science behind fingerprints and why they are so unique and important in criminal investigations. It also explores how technology is using fingerprints for security purposes and how each person's fingerprint...
National Institute of Standards and Technology
Key to Security: Biometric Standards
NIST develops and tests biometrics (e.g., fingerprint, face, iris, & multimodal) standards and technology that promote security, interoperability, and innovation. Four projects (in collaboration with the DHS and the FBI) are highlighted:...
Science360
Biometrics - Science of Innovation
A method for capturing and analyzing the vein patterns in the white part of the eye to help identify people. Biometrics has potential applications for driver's licenses, passports or computer identification control. Provided by the...
Science360
Uncertainties - How Do We Know?
How much warming do we face, and what are the uncertainties involved?
National Institute of Standards and Technology
No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere
NIST computer scientist Matt Aronoff describes the NIST Biometrics Web Services project, a new protocol that allows any device that can communicate with the Web to accept data from any biometrics sensors (such as fingerprint scanners,...
Curated Video
5G and Wireless Communication for Beginners - Picking up the Right Call Recipient
This video demonstrates how the antenna discriminates between the intended recipient and other recipient who are covered in the range of antenna. This clip is from the chapter "Introduction – 1G is Where All of it Began" of the series...
Programming Electronics Academy
EPS 4: Fingerprint Readers and Remote Igniters with Noah Del Coro
This week Michael sits down with engineering student Noah Del Coro to talk about a couple of interesting projects that he’s been able to build using Arduino.
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - IAAA - Part 1- Identification, Authentication, Authorization, and Accountability
This is the first part of a two-part video that explains the concept of IAAA. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Browser Security Part I
In part 1 of this video series, you will be presented with the main security issues when it comes to using the major browsers in the market today. You will learn about invasive and dangerous things such as browser scripts, trackers,...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - 2-Factor Authentication Part I
In this 2-part eye-opening video module, you will learn all about wonderful 2-factor authentication: an excellent solution for preventing hackers hijacking your account! The term ‘2FA’ will be explained in simple terms, and then you...
Curated Video
Python for Machine Learning - The Complete Beginners Course - Introduction to Classification
In this video, we will have a quick introduction to classification. This clip is from the chapter "Classification Algorithms: K-Nearest Neighbors" of the series "Python for Machine Learning - The Complete Beginner's Course".In this...
Curated Video
The Complete Practical Docker Guide - Connecting to the Linux Server Remotely Via SSH
This video explains connecting to the Linux server remotely via SSH. This clip is from the chapter "Networking in Linux" of the series "The Complete Practical Docker Guide".This section focuses on networking in Linux.
Learning Mole
Mystery of The Steolen Sandwich
This Lucas Detective video lesson is the Mystery of the Stolen Sandwich.Students will enjoy joining Lucas in this animated video as they discover STEM subjects and work to unveil the mystery.
Curated Video
Detectives Use this Simple Technique to Find Your Fingerprints (Even AFTER You Have Wiped Them Off)!
There’s a common movie trope of an actor wiping their fingerprints off a gun. It seems like a simple wipe with a cloth eliminates any trace of a criminal’s guilt, but that isn’t actually the case! Scientists have developed a method that...
NASA
NASA | Ask A Climate Scientist - Extreme Weather and Global Warming
Is the frequency of extreme weather events a sign that global warming is gaining pace and exceeding predictions? "Now, direct evidence of the footprint or the fingerprint of global warming: we're seeing more frequent, more intense, and...
Getty Images
Detective dusting for fingerprints
Female police detective dusting for prints on window of burgled house / detective's brush dusting for finger prints on window / Detective pointing out fingerprint on window. Detective dusting for fingerprints on November 03, 1993 in...
Getty Images
Typing run on paper with blood stains and bloody fingerprints
Typing run on paper with blood stains and bloody fingerprints