All
Search
Images
Videos
Shorts
Maps
News
Copilot
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
1:16
Defensive Design | 3.1 | OCR GCSE Computer Science | J277
1.5K views
10 months ago
YouTube
CSNewbs
6:25
OCR Computer Science 2.3.1 Defensive design
20 views
5 months ago
YouTube
Computer Science Revision Hub
4:05
2.3.1 Defensive Design - Revise GCSE Computer Science
3.1K views
Oct 14, 2021
YouTube
Revise Computer Science
3:23
74. OCR GCSE (J277) 2.3 Defensive design considerations 1
61.7K views
Jan 6, 2020
YouTube
Craig'n'Dave
0:54
What Is Hostile Architecture? đź‘€
2.1K views
6 months ago
YouTube
f.y.i. arch
2:00
Defensive Design: Protecting Users in the AI Era
140 views
3 months ago
YouTube
Commit & Push
4:49
75. OCR GCSE (J277) 2.3 Defensive design considerations 2
45.1K views
Jan 6, 2020
YouTube
Craig'n'Dave
8:09
Defensive Programming and Design By Contract
1.6K views
May 23, 2024
YouTube
Merlin Wellington
1:06:17
30 Medieval Fortification Techniques That Revolutionized
…
22 views
3 months ago
YouTube
Medieval Secrets Told
12:20
Find in video from 05:27
Coding Examples of Buffer Overflows
Defensive Design & Security By Design in Software Development:
…
289 views
May 10, 2024
YouTube
Rakia Ben Sassi | TekForge
0:19
Three Lines of Defense Model Explained | Risk Management & In
…
171 views
3 months ago
YouTube
Academy of Internal Audit
0:26
What is HOSTILE Architecture in Public Spaces?
8 views
5 months ago
YouTube
WAVE.
11:48
Defense in Depth | A Layered Security Strategy You NEED to Kn
…
321 views
10 months ago
YouTube
Cyber Education World
13:31
The 3 Step Formula Behind Every Defense In Football
4.9K views
9 months ago
YouTube
Football Merritt
24:47
What is Defense-in-Depth? | How to implement defense-in-depth| Laye
…
15.6K views
Jul 17, 2023
YouTube
CyberPlatter
3:35
How to Explain Conceptual Framework in Research Defense
5.2K views
Nov 11, 2024
YouTube
vlogommentary
33:39
Domain-Driven Design Demystified: 06- Tactical Design - Getting Started
3.9K views
6 months ago
YouTube
Passionate Coders | Ů…ŘŮ…ŘŻ المهدي
14:52
Find in video from 01:08
Example Playbook for 13
Creating A Defensive Playbook: The Step by Step Process
2.5K views
Jan 5, 2023
YouTube
MFQ FOOTBALL
0:44
Operational Risk Management: Three Lines of Defense Model | Ho
…
168 views
10 months ago
YouTube
Smart Online Course
20:56
Understanding Defensive Fronts & Structure | Key Concepts for Foot
…
17.7K views
Jun 25, 2023
YouTube
American Football Academy
0:50
Best example of defensive driving well done Kyle.
3.8K views
3 months ago
YouTube
Cruise And Pass Driving School
15:21
Every Football Defensive Formation Explained In 15 Minutes
4.6K views
6 months ago
YouTube
Football Focus
12:06
Every Defensive Formation Explained in 12 Minutes
320.9K views
9 months ago
YouTube
Fourth and Film
10:55
6 Self-Defense Techniques Everyone Should Know!
7.4K views
Oct 30, 2024
YouTube
Sifu Alan Baker
25:32
Rimworld : Killbox guide and defensive design : Tutorial Nugget
901.1K views
Jun 23, 2020
YouTube
Francis John
13:18
Breaking The Kill-Chain: A Defensive Approach
188.8K views
Feb 5, 2019
YouTube
The CISO Perspective
43:44
Defense Mechanisms 101: A Complete Run-Down Of How They
…
76.1K views
Jun 7, 2024
YouTube
Heidi Priebe
7:34
Nail your PhD defense presentation: A guide to content, design, and de
…
9.3K views
May 28, 2024
YouTube
Prezi
17:41
HOW TO CREATE A SOCCER SESSION PLAN using US Soccer r
…
2.6K views
May 17, 2024
YouTube
Soccerspective
18:31
Cybersecurity Architecture based on a Defense-in-Depth Design.
12K views
Dec 6, 2020
YouTube
Bernard Institute for Cybersecurity
See more videos
More like this
Feedback