Curated Video
Evolution of Mobile Phones: From Wireless Telephones to Lifestyle Devices
The video explores the evolution of mobile phone technology, from the earliest wireless telephone invented by Nathan Stubblefield in 1902 to modern advancements like biometric security features and fitness tracking capabilities. It...
Curated Video
Revolutionizing the Fashion Industry: The Smart Dressing Mirror
The smart dressing mirror is a cutting-edge technology that revolutionizes the clothes shopping experience by allowing customers to virtually try on garments, mix and match outfits, and receive personalized recommendations. Developed by...
Curated Video
Internet Security Threats: The Rise of Financially Motivated Hackers
The video highlights the shift in motivations of modern computer hackers towards financial gain, with a rise in attacks involving identity theft, extortion, and fraud. Symantec's report reveals the prevalence of phishing messages,...
Curated Video
The Evolution of Roman Defensive Strategies: From Client States to Defence in Depth
This video explores the evolution of Rome's defensive strategies from client states to a defense in depth system in response to changing geopolitical and military challenges. It discusses the trade-offs between comprehensive security and...
Curated Video
Vance Packard - The Hidden Persuaders
Vance Packard was not an advertising executive nor a marketer: he was a journalist. But, his book, the Hidden Persuaders, exposed the 1950s advertising industry. In many ways, Hidden Persuaders provides the background scenery of...
Curated Video
Ryan & Deci: Self Determination Theory (SDT) - Content Models of Motivation
Ryan & Deci are the founders of Self Determination Theory (SDT). It's possibly the most substantial modern body of research on motivation. As such, it is essential for modern managers to understand the basics.
Curated Video
Ensuring Information Security: Challenges and Preparations for Major Events
The video discusses the importance of information security in the world of technology, highlighting the potential threats from organized crime and individual hackers. It also mentions the massive undertaking of ensuring information...
Curated Video
Enhanced Airport Security Measures to Combat Terrorism
Since the terrorist attacks on New York, airports worldwide, including the main airports in the UK, have implemented tighter security measures. The British Airports Authority (BAA) has taken responsibility for airport security and has...
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - AWS Multi-Factor Authentication (MFA)
This video demonstrates how to set up the AWS multifactor authentication.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Virtual Private Cloud (VPC)
This is the final cloud deployment model, the virtual private cloud, which maintains the same security restrictions as a private cloud but offloads apps or workloads as a public cloud.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Private Cloud
In this video, we will understand the first cloud deployment model, the private model, single-tenant environments accessible by a single organization.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Self-Hosting Versus Hosting Provider
In this lesson, we will understand the basic difference between the self-hosting provider, which runs and maintains a website or service using a private web server, and the hosting provider, using a service outside of someone's own control.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Disabling Root User Access and Password Authentication
In this video, we will look at a demonstration to add an extra layer of security to the user and plain password authentication.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Introduction to Linux
In this video, we will focus on Linux, starting with the Linux overview.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Benefits of Cloud Computing
This lecture will explain the various benefits of cloud computing, the core advantages, and cloud administration.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - IAM Multi-Factor Authentication (MFA)
This lesson will examine IAM multifactor authentication applicable to AWS and the AWS root account.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Configure a Custom Password Policy
In this lesson, we will configure a custom password policy as an added layer of security for an AWS user account.
Curated Video
GCSE Physics - Visible and UV Light #67
This video covers: - The different colours of visible light - How light is used is optical fibres - The concept of fluorescence with ultraviolet radiation - How ultraviolet radiation can be used in security General info: - Suitable for...
Curated Video
The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Android Security Tweaks
This video talks about a few more settings that you might need to tweak to keep your Android device safe from attacks. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to Cybersecurity...
Curated Video
The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Google Play Versus the App Store
In this video, the author tries to explain the difference between Google Play Store and the App Store and shares a few statistics to support the explanation. It also answers the question of which is more secure—the Apple App Store or the...
Curated Video
The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Android Versus Apple Versus Blackberry
This video helps us compare the top three mobile operating systems, which are Android, Apple, and Blackberry. The author will take you through the major pros and cons of using each one. By the end of the video, you will understand which...
Packt
Android Security Tweaks
This video talks about a few more settings that you might need to tweak to keep your Android device safe from attacks. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to Cybersecurity...
Curated Video
Build a Super Advanced Trading Bot on DYDX Hosted on AWS with Python - AWS EC2 - Plan of Attack
In this video, we will outline the plan of attack for deploying your trading bot on an AWS EC2 (Elastic Compute Cloud) instance. You will gain a clear understanding of the steps involved, from creating a security group to launching the...
Curated Video
AWS Tutorial AWS Solutions Architect and SysOps Administrator - Network ACLs Versus Security Groups
This video talks about network ACLs versus security groups. This clip is from the chapter "VPC - Configure Custom Virtual Private Cloud in AWS Cloud" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This...