All
Search
Images
Videos
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
X-431 | IMMO: Security Matching Process | LAUNCH
9.4K views
Sep 10, 2021
YouTube
Launch Tech Co., Ltd
4:02
How Accurate Are Biometric Matching Algorithms For Security
…
3 months ago
YouTube
SecurityFirstCorp
4:00
What Is The Biometric Matching Algorithm In Access Control? - Se
…
3 months ago
YouTube
SecurityFirstCorp
17:05
Vulnerability Response Recommended Best Practice for C
…
859 views
11 months ago
YouTube
ServiceNow Community
8:39
Find in video from 01:00
First Match Logic Explained
"Understanding ACL Logic: How Matching Rules Work"
3.7K views
Sep 6, 2021
YouTube
Sikandar Shaik CCIEx3
4:18
What Are The Types Of Biometric Data Matched? - SecurityFirstCorp
…
8 views
3 months ago
YouTube
SecurityFirstCorp
PATTERN MATCHING || BRUTE FORCE APPROACH || ALGORITH
…
61.5K views
May 17, 2023
YouTube
T V Nagaraju Technical
11:13
Application Security Tutorial | Application Security Basics | Cybe
…
25.1K views
Aug 5, 2022
YouTube
Simplilearn
12:33
Public and Private Keys - Signatures & Key Exchanges - Cryptography
…
387.9K views
Oct 18, 2021
YouTube
Practical Networking
7:02
Prioritize Security Incidents Based on Data Importance | Microsoft De
…
5K views
May 6, 2024
YouTube
Microsoft Mechanics
2:18
The Matching Algorithm - Explained
49.8K views
Oct 22, 2020
YouTube
National Matching Services
4:33
Port-Security Explained | What Is Port-Security? | How it work? | Net
…
3.5K views
Jul 15, 2021
YouTube
Networking Academy
19:48
Each layer of the OSI model and TCP/IP explained.
313.5K views
Oct 13, 2019
YouTube
danscourses
13:47
IPsec - IKE Phase 1 | IKE Phase 2
100.1K views
Mar 20, 2021
YouTube
Networking Newbies
8:46
Brute Force Attack
174.4K views
May 2, 2021
YouTube
Neso Academy
6:15
Changing user authentication methods for Microsoft Entra Multi
…
17.5K views
May 10, 2023
YouTube
Microsoft Helps
3:57
Understanding detection technology in the email entity page of Microso
…
4 months ago
Microsoft
chrisda
3:03
How Does 1:1 Matching Secure Your Biometrics? - Ask Your Bank Teller
1 month ago
YouTube
Ask Your Bank Teller
2:53
What Is 1:1 Matching In Biometric Authentication? - Ask Your Bank
…
1 month ago
YouTube
Ask Your Bank Teller
10:25
Get started with phishing resistant multifactor authentication
4.3K views
Apr 3, 2024
YouTube
Microsoft Security
Windows Hello for Business
Nov 22, 2024
Microsoft
paolomatarazzo
2:51
Security or Firewall Settings Might Be Blocking the Connection in Wi
…
76.1K views
Dec 31, 2023
YouTube
MDTechVideos
38:39
TryHackMe Networking Secure Protocols Walkthrough | Step-by-
…
18.8K views
Nov 7, 2024
YouTube
The Helpful Hacker
2:35
TSA expands controversial facial recognition program for security
11.9K views
Jun 5, 2023
YouTube
CBS Mornings
1:08
Travel Tips: Automated Screening Lanes
267.9K views
May 21, 2018
YouTube
TSA
12:32
How secure is Biometric Authentication Technology and Bi
…
98.1K views
Dec 31, 2019
YouTube
DW Shift
12:47
Tutorial: Understanding the NAT/Security Policy Configuration
115.5K views
Nov 8, 2017
YouTube
Palo Alto Networks LIVEcommunity
1:46
Find in video from 00:37
DKIM Email Security
DKIM Explained - How It Works | Mailtrap
42.6K views
May 2, 2022
YouTube
Mailtrap
19:24
Find in video from 04:08
Using the Match Block
IEE 475: Arena Help - Match Example: Customers Waiting on O
…
11.1K views
Nov 25, 2020
YouTube
Ted Pavlic
2:15
How Does Signature-based Detection Find Computer Viruses
…
13 views
3 months ago
YouTube
Tech Terms Explained
See more videos
More like this
Feedback