{"pages":{"search":{"query":"Security Engineering","originalQuery":"Security Engineering","serpid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","parentReqid":"","serpItems":[{"id":"9200744489677434471-0-0","type":"videoSnippet","props":{"videoId":"9200744489677434471"},"curPage":0},{"id":"6575903821755483969-0-1","type":"videoSnippet","props":{"videoId":"6575903821755483969"},"curPage":0},{"id":"9586382433096562773-0-2","type":"videoSnippet","props":{"videoId":"9586382433096562773"},"curPage":0},{"id":"R-I-113683-5-0-3","type":"direct","props":{"isPornoQuery":false,"query":"Security Engineering","text":"Security Engineering","expFlags":{"video_direct_config_desktop_search":"search-grid-row:R-I-48058-718:R-I-474674-109,search-grid-head:R-I-2120168-7","video_direct_render_in_viewport":1,"video_direct_viewport_margin_desktop":700},"pageType":"search","directConfig":{"search":{"id":"R-I-48058-715","pornoId":"R-I-474674-108"},"search-grid-row":{"id":"R-I-48058-718","pornoId":"R-I-474674-109"},"search-grid-head":{"id":"R-I-2120168-7"}},"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","yandexuid":"1539657971725950441","uuid":null,"platform":"desktop","placement":"search","position":3,"nonce":"3412303870553965797721","fastRender":false,"originalDirectId":"R-I-113683-5","shouldUseContentVisibility":false},"curPage":0},{"id":"12895167742326849596-0-4","type":"videoSnippet","props":{"videoId":"12895167742326849596"},"curPage":0},{"id":"6998406427771070590-0-5","type":"videoSnippet","props":{"videoId":"6998406427771070590"},"curPage":0},{"id":"572594079742785173-0-6","type":"videoSnippet","props":{"videoId":"572594079742785173"},"curPage":0},{"id":"2500345641454407945-0-7","type":"videoSnippet","props":{"videoId":"2500345641454407945"},"curPage":0},{"id":"16619876699264623812-0-8","type":"videoSnippet","props":{"videoId":"16619876699264623812"},"curPage":0},{"id":"10062379656545679927-0-9","type":"videoSnippet","props":{"videoId":"10062379656545679927"},"curPage":0},{"id":"R-I-113683-5-0-10","type":"direct","props":{"isPornoQuery":false,"query":"Security Engineering","text":"Security Engineering","expFlags":{"video_direct_config_desktop_search":"search-grid-row:R-I-48058-718:R-I-474674-109,search-grid-head:R-I-2120168-7","video_direct_render_in_viewport":1,"video_direct_viewport_margin_desktop":700},"pageType":"search","directConfig":{"search":{"id":"R-I-48058-715","pornoId":"R-I-474674-108"},"search-grid-row":{"id":"R-I-48058-718","pornoId":"R-I-474674-109"},"search-grid-head":{"id":"R-I-2120168-7"}},"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","yandexuid":"1539657971725950441","uuid":null,"platform":"desktop","placement":"search","position":10,"nonce":"3412303870553965797721","fastRender":false,"originalDirectId":"R-I-113683-5","shouldUseContentVisibility":false},"curPage":0},{"id":"8420402231339563110-0-11","type":"videoSnippet","props":{"videoId":"8420402231339563110"},"curPage":0},{"id":"9321585758009314139-0-12","type":"videoSnippet","props":{"videoId":"9321585758009314139"},"curPage":0},{"id":"8588804762576193755-0-13","type":"videoSnippet","props":{"videoId":"8588804762576193755"},"curPage":0},{"id":"15194204044637110253-0-14","type":"videoSnippet","props":{"videoId":"15194204044637110253"},"curPage":0},{"id":"10705217378312548285-0-15","type":"videoSnippet","props":{"videoId":"10705217378312548285"},"curPage":0}],"filters":{},"serpFooter":{"linksGroups":[{"type":"geo","links":[{"label":"Columbus","title":"Columbus","url":"//yandex.com.tr/tune/geo/","logNode":{"name":"region"},"target":"_self","a11yLabel":"Bölgeniz Columbus","needRetpath":true}]},{"type":"help","links":[{"label":"Bize ulaşın","url":"https://yandex.com.tr/support/video/troubleshooting.html","logNode":{"name":"feedback"},"needRetpath":true},{"label":"Yardım","url":"https://yandex.com.tr/support/video/","logNode":{"name":"help"},"needRetpath":true}]},{"type":"settings","links":[{"label":"Ayarlar","url":"https://yandex.com.tr/tune/search/","target":"_self","logNode":{"name":"settings"},"needRetpath":true}]},{"type":"company","links":[{"label":"Şirket hakkında","url":"//yandex.com.tr/company/","logNode":{"name":"about"},"target":"_blank"},{"label":"Kullanım lisansı","url":"//yandex.com.tr/legal/termsofuse/","logNode":{"name":"license"},"target":"_blank"},{"label":"Gizlilik Politikası","url":"//yandex.com.tr/legal/confidential/","logNode":{"name":"confidential"},"target":"_blank"}],"a11yHidden":true}],"hasExtralinks":true},"currentPage":0,"prevPageToLoad":-1,"nextPageToLoad":1,"isTranslationsFilterEnabled":false,"isTranslationsDistributionEnabled":false,"isTranslationsDistributionOnboardingEnabled":false,"isFeedbackModalVisible":false,"viewerData":{"ctx":{"retpath":"https://twitter.yandex.com.tr/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","isAdsDisabled":false,"query":"Security Engineering","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","signedReqid":"c91e12c2e573fe0e6e4825c1f4e8c870","videoServiceUrl":"https://twitter.yandex.com.tr/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","numdocs":14,"videoSearchUrl":"https://twitter.yandex.com.tr/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","isPornoQuery":false,"quasarData":{"type":"QuasarAuth","retpath":"https://twitter.yandex.com.tr/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","counters":{"popupShow":{"path":"auth.show.quasar"},"popupClose":{"path":"auth.close.quasar"},"loginShow":{"path":"auth.login.show.quasar"},"loginClick":{"path":"auth.login.click.quasar"},"registrationShow":{"path":"auth.registration.show.quasar"},"registrationClick":{"path":"auth.registration.click.quasar"}}},"cookie":{"yp":"undefined"},"reportFeedbackBaseProps":{"initEmail":"","metaFields":{"userAgent":"Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)","userTestids":"191768,223386,238743,246500,257621,253288,265553,270072,277807,274239,294077,278842,299121,313103,331010,338398,378416,359879,415420,644350,652605,645301,679708,689693,690449,696466,696473,722746,740796,769020,776165,777765,771230,781521,790415,801982,851450,878348,886706,883477,900639,931367,937268,969063,935488,945314,989988,982463,991363,990185,1015567,1011895,1035320,1033956,1035241,1036046,1068593,1087297,1089355,1060131,1076329,1099741,1103590,1095365,1071879,1092870,66285,1103958,1088256,1104658,1106104,43962,90500,1097905,46453","yandexuid":"1539657971725950441","uid":"0","queryText":"Security Engineering","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL"}}},"organicSnippets":{"0":[{"clear_description":"Ross explains how real-world social engineering attacks work, and how the psychology of users can be exploited or reinforced depending on whether the desired goal is to attack or make a system...","description":"Ross explains how real-world social \u0007[engineering\u0007] attacks work, and how the psychology of users can be exploited or reinforced depending on whether the desired goal is to attack or make a system...","videoWidth":640,"videoHeight":360,"isPorno":false,"online":false,"extra":{"related":{"text":"Security Engineering Lecture 6: Psychology and Behavioural Economics","related_orig_text":"Security Engineering","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Security Engineering\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=9YIDBp1S5WI\",\"src\":\"serp\",\"rvb\":\"EqoCChM5MjAwNzQ0NDg5Njc3NDM0NDcxChM2NTc1OTAzODIxNzU1NDgzOTY5ChM5NTg2MzgyNDMzMDk2NTYyNzczChQxMjg5NTE2Nzc0MjMyNjg0OTU5NgoTNjk5ODQwNjQyNzc3MTA3MDU5MAoSNTcyNTk0MDc5NzQyNzg1MTczChMyNTAwMzQ1NjQxNDU0NDA3OTQ1ChQxNjYxOTg3NjY5OTI2NDYyMzgxMgoUMTAwNjIzNzk2NTY1NDU2Nzk5MjcKEzg0MjA0MDIyMzEzMzk1NjMxMTAKEzkzMjE1ODU3NTgwMDkzMTQxMzkKEzg1ODg4MDQ3NjI1NzYxOTM3NTUKFDE1MTk0MjA0MDQ0NjM3MTEwMjUzChQxMDcwNTIxNzM3ODMxMjU0ODI4NRoVChM5MjAwNzQ0NDg5Njc3NDM0NDcxWhM5MjAwNzQ0NDg5Njc3NDM0NDcxaq4DEgEwGAAiRRoxAAoqaGhtZHF3cm96Y21yeGNoYmhoVUNSdzI1SFZqMVJ2bDJYY0VIZGo0UEtnEgIAEioQwg8PGg8_E4cbggQkAYAEKyqLARABGniB-w8CBv0EAPwADwUHB_wB-voE8_r9_AD08fn_BQL_AOv5BQX8_wAACQcGDwEAAAAC_v328_0BAAMDBAL8AAAAFQ4I_vYAAAAK_QQL_wEAAPXy_wED_wAAEfgLDAAAAAD_-goQAAAAAPAM9PwAAAAACgL1AQAAAAAgAC0yyNw7OBNACUhOUAIqcxAAGmAxFAAcFvQAzAQa5vz99gX9_i8g4eTnACnqAAIqC-36HevCJgoA_c0SAsIAAAA3Dt040QDHUPLx0Qr8_wjv7_DnJX8NEPIA_S7z7ennASv39gT3JCIA2vv5-w7P7yT8RhsgAC1IUFQ7OBNACUhvUAIqUxABGkDlEvKhJgEf9wb4Eukn_irdEMoF_PYH9PcJGfzGLvP99-jsTe0VICQP7hcYHgn--BgH4c_zGjLrMNMBgQgr7dv5IAAtABVsOzgTQA9IcVACMAk4AUoAYABoAA,,\"}","related_url":"http://www.youtube.com/watch?v=9YIDBp1S5WI","parent-reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-7-9-ZC1883FD341A054AC","isVertical":false,"hasTranscription":false,"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","dups":[{"nonStopSupported":true,"filmId":"9200744489677434471","duration":3463,"origin":"http://www.youtube.com/watch?v=9YIDBp1S5WI","title":{"url":"https://twitter.yandex.com.tr/video/preview/9200744489677434471?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 6: Psychology and Behavioural Economics"},"clear_title":"Security Engineering Lecture 6: Psychology and Behavioural Economics","green":{"url":"http://www.youtube.com/watch?v=9YIDBp1S5WI","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2F9YIDBp1S5WI%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/9YIDBp1S5WI?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=9YIDBp1S5WI","detailUrl":"https://twitter.yandex.com.tr/video/preview/9200744489677434471?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=9YIDBp1S5WI","providerName":"YouTube","url":"http://www.youtube.com/watch?v=9YIDBp1S5WI","thumb":{"online":false,"duration":"57:43","image":"//avatars.mds.yandex.net/get-vthumb/3275282/04aa6e73154e9d11cae5cad2125307c8/564x318_1"},"views":1323,"time":"2022-04-14T15:51:35.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"9200744489677434471","duration":3463,"origin":"http://www.youtube.com/watch?v=9YIDBp1S5WI","title":{"url":"https://twitter.yandex.com.tr/video/preview/9200744489677434471?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 6: Psychology and Behavioural Economics"},"clear_title":"Security Engineering Lecture 6: Psychology and Behavioural Economics","green":{"url":"http://www.youtube.com/watch?v=9YIDBp1S5WI","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2F9YIDBp1S5WI%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/9YIDBp1S5WI?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=9YIDBp1S5WI","detailUrl":"https://twitter.yandex.com.tr/video/preview/9200744489677434471?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=9YIDBp1S5WI","providerName":"YouTube","url":"http://www.youtube.com/watch?v=9YIDBp1S5WI","thumb":{"online":false,"duration":"57:43","image":"//avatars.mds.yandex.net/get-vthumb/3275282/04aa6e73154e9d11cae5cad2125307c8/564x318_1"},"views":1323,"time":"2022-04-14T15:51:35.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}},{"clear_description":"Ian talks about some of the interesting challenges of security engineering when looking at national-scale and national-security problems. Ian became Technical Director of the National Cyber...","description":"Ian talks about some of the interesting challenges of \u0007[security\u0007] \u0007[engineering\u0007] when looking at national-scale and national-\u0007[security\u0007] problems. Ian became Technical Director of the National Cyber...","videoWidth":1920,"videoHeight":1080,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/Qqkb_gEAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Security Engineering Lecture 16: Ian Levy, NCSC - Protecting a country for fun and profit","related_orig_text":"Security Engineering","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Security Engineering\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=qv6SS5FhdUk\",\"src\":\"serp\",\"rvb\":\"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_E9ciggQkAYAEKyqLARABGniB_w___gf4AAP5DxAGDPkDEgoN8_QBAQD38wHwAwT-APjz9_v3AAAABAMKBgMAAAD9BgH6-f0BABoLAw4FAAAAEOoKBvoAAAAAGvQI_gAAAAX2_gMBDQACGvn-DgAAAAABBvwH-P4AAQHz_vcAAAAADQP7CwAAAAAgAC3_AL87OBNACUhOUAIqcxAAGmBh9wAR_hYR8vg73e8W0vff1xQI980C__jxAAon9fbzH-eyCAD_N7YpEa4AAAAqFu9N_ADsbtzT8QXoKunBo_UcAH_sJfzh_SrL5MgHE_Xh_e0EOi4A_AKr9DvJvzgqDAAgAC2zdyc7OBNACUhvUAIqUxABGkAeCPidDwYi8AHwFvgVBya-Fb34-_gT_f0HGwLKLfMEA-3jM_QeHCcR5A4YJ_0h-A785tvyISXwJu30gQY19N30IAAtGq9wOzgTQA9IcVACMAk4AUoAYABoAA,,\"}","related_url":"http://www.youtube.com/watch?v=qv6SS5FhdUk","parent-reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-3-3-Z7DBD2A07E66FEF8C","isVertical":false,"hasTranscription":false,"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","dups":[{"nonStopSupported":true,"filmId":"6575903821755483969","duration":4439,"origin":"http://www.youtube.com/watch?v=qv6SS5FhdUk","title":{"url":"https://twitter.yandex.com.tr/video/preview/6575903821755483969?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 16: Ian Levy, NCSC - Protecting a country for fun and profit"},"clear_title":"Security Engineering Lecture 16: Ian Levy, NCSC - Protecting a country for fun and profit","green":{"url":"http://www.youtube.com/watch?v=qv6SS5FhdUk","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2Fqv6SS5FhdUk%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/qv6SS5FhdUk?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=qv6SS5FhdUk","detailUrl":"https://twitter.yandex.com.tr/video/preview/6575903821755483969?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=qv6SS5FhdUk","providerName":"YouTube","url":"http://www.youtube.com/watch?v=qv6SS5FhdUk","thumb":{"online":false,"duration":"1:13:59","image":"//avatars.mds.yandex.net/get-vthumb/1626750/4224dfbe68bf4a55ddca981a8df5b5cb/564x318_1"},"views":3006,"time":"2022-04-07T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"6575903821755483969","duration":4439,"origin":"http://www.youtube.com/watch?v=qv6SS5FhdUk","title":{"url":"https://twitter.yandex.com.tr/video/preview/6575903821755483969?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 16: Ian Levy, NCSC - Protecting a country for fun and profit"},"clear_title":"Security Engineering Lecture 16: Ian Levy, NCSC - Protecting a country for fun and profit","green":{"url":"http://www.youtube.com/watch?v=qv6SS5FhdUk","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2Fqv6SS5FhdUk%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/qv6SS5FhdUk?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=qv6SS5FhdUk","detailUrl":"https://twitter.yandex.com.tr/video/preview/6575903821755483969?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=qv6SS5FhdUk","providerName":"YouTube","url":"http://www.youtube.com/watch?v=qv6SS5FhdUk","thumb":{"online":false,"duration":"1:13:59","image":"//avatars.mds.yandex.net/get-vthumb/1626750/4224dfbe68bf4a55ddca981a8df5b5cb/564x318_1"},"views":3006,"time":"2022-04-07T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}},{"clear_description":"Ross explains how political forces can both help and hinder the goals of achieving secure and reliable systems design.","description":"Ross explains how political forces can both help and hinder the goals of achieving \u0007[secure\u0007] and reliable systems design.","videoWidth":640,"videoHeight":360,"isPorno":false,"online":false,"extra":{"related":{"text":"Security Engineering Lecture 15: Governance and Regulation","related_orig_text":"Security Engineering","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Security Engineering\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=PdMzMHizEaE\",\"src\":\"serp\",\"rvb\":\"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_E-4bggQkAYAEKyqLARABGniBBRT9CQT8APsDAw8LCfoCHwL6_gMCAwDs_Af6BwAAAOD3B_YC_gAAAPwQ_QkAAAAC_v318v0BAA4EAf4FAAAAEwUG-fcAAAAPA_f-_gEAAPn4_QYE_wAAE_cNDQAAAAAFCwX_AAAAAPv_BfcAAAAAAvvqBAD_AAAgAC1L5Mc7OBNACUhOUAIqcxAAGmA6DQAdHesEqwAu1vUX0u4I60YIC9zX_x66ACopHfvlAd20D_D_MMMaEa0AAAAJ-8pJ6QDMbeUA1-YNGfrkAu_-LH8C_fvR7DUP_OH5EUsWGf0sQ1UA0xkF7PuRAQsONB0gAC3xlyU7OBNACUhvUAIqUxABGkAIDPWdGQUd-gMHDfEbBijFEcr-_fUO_PoEGQHMK_b__OvnNfEUHigN8wsWJP8Y-RQE4tbvGCfqHOn2gQsx_d_3IAAtyjp8OzgTQA9IcVACMAk4AUoAYABoAA,,\"}","related_url":"http://www.youtube.com/watch?v=PdMzMHizEaE","parent-reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-7-15-Z5CD100856C009538","isVertical":false,"hasTranscription":false,"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","dups":[{"nonStopSupported":true,"filmId":"9586382433096562773","duration":3566,"origin":"http://www.youtube.com/watch?v=PdMzMHizEaE","title":{"url":"https://twitter.yandex.com.tr/video/preview/9586382433096562773?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 15: Governance and Regulation"},"clear_title":"Security Engineering Lecture 15: Governance and Regulation","green":{"url":"http://www.youtube.com/watch?v=PdMzMHizEaE","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FPdMzMHizEaE%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/PdMzMHizEaE?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=PdMzMHizEaE","detailUrl":"https://twitter.yandex.com.tr/video/preview/9586382433096562773?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=PdMzMHizEaE","providerName":"YouTube","url":"http://www.youtube.com/watch?v=PdMzMHizEaE","thumb":{"online":false,"duration":"59:26","image":"//avatars.mds.yandex.net/get-vthumb/4518546/d3cc139cc49e378679f0e2770a5bd8f1/564x318_1"},"views":1200,"time":"2022-03-06T12:30:07.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"9586382433096562773","duration":3566,"origin":"http://www.youtube.com/watch?v=PdMzMHizEaE","title":{"url":"https://twitter.yandex.com.tr/video/preview/9586382433096562773?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 15: Governance and Regulation"},"clear_title":"Security Engineering Lecture 15: Governance and Regulation","green":{"url":"http://www.youtube.com/watch?v=PdMzMHizEaE","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FPdMzMHizEaE%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/PdMzMHizEaE?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=PdMzMHizEaE","detailUrl":"https://twitter.yandex.com.tr/video/preview/9586382433096562773?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=PdMzMHizEaE","providerName":"YouTube","url":"http://www.youtube.com/watch?v=PdMzMHizEaE","thumb":{"online":false,"duration":"59:26","image":"//avatars.mds.yandex.net/get-vthumb/4518546/d3cc139cc49e378679f0e2770a5bd8f1/564x318_1"},"views":1200,"time":"2022-03-06T12:30:07.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}},{"type":"video_direct","groudId":"3","directId":"R-I-113683-5","isFake":true},{"clear_description":"Sam discusses supply-chain attacks including Operation Gunman, or how there are many points of failure in the security model of modern devices. He looks at the emergent security properties and...","description":"Sam discusses supply-chain attacks including Operation Gunman, or how there are many points of failure in the \u0007[security\u0007] model of modern devices. He looks at the emergent \u0007[security\u0007] properties and...","videoWidth":1280,"videoHeight":720,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/Ky3n9gEAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Security Engineering Lecture 12: Ecosystems Security","related_orig_text":"Security Engineering","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Security Engineering\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=-RH8MEoJunM\",\"src\":\"serp\",\"rvb\":\"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_AUAAv8FAQ0F_gEi-AIA9QQEAPn9_gMFAv8A9O7_9QH_AAAEAggFAgAAAAn9A__4_gEAAwMEAvwAAAAYAv0A-AAAAAkG9wj-AQAA_gD4BgP_AAAF-_8TAAAAAPsEBP0AAAAA_v3-_QAAAAAI8_kCAAAAACAALcFa4Ds4E0AJSE5QAipzEAAaYDr0ACES-_foAmHy2B7TJ9rsLRAgy-b_Ear_C0cCCtwmzJMh7_8z8BzzngAAADHt6kHBAOR_u80AD_1S_baTDPEEf-MdENzkJAvi2gj48_v7KABgRAAG86gVQ8HSF1L37iAALV-NEDs4E0AJSG9QAipTEAEaQPkC-aEW-hb3BAoJ5yAJNMgJ0Pz-_g769wwb_css-Pj5-ess7Q8gIhvlCxofAyH5FQjk3_AcJe0g3O-BDzH83gkgAC1NUXw7OBNAD0hxUAIwCTgBSgBgAGgA\"}","related_url":"http://www.youtube.com/watch?v=-RH8MEoJunM","parent-reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-11-14-Z6701971295CF85AF","isVertical":false,"hasTranscription":false,"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","dups":[{"nonStopSupported":true,"filmId":"12895167742326849596","duration":3850,"origin":"http://www.youtube.com/watch?v=-RH8MEoJunM","title":{"url":"https://twitter.yandex.com.tr/video/preview/12895167742326849596?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 12: Ecosystems \u0007[Security\u0007]"},"clear_title":"Security Engineering Lecture 12: Ecosystems Security","green":{"url":"http://www.youtube.com/watch?v=-RH8MEoJunM","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2F-RH8MEoJunM%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/-RH8MEoJunM?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=-RH8MEoJunM","detailUrl":"https://twitter.yandex.com.tr/video/preview/12895167742326849596?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=-RH8MEoJunM","providerName":"YouTube","url":"http://www.youtube.com/watch?v=-RH8MEoJunM","thumb":{"online":false,"duration":"1:04:10","image":"//avatars.mds.yandex.net/get-vthumb/3174341/dae5956eec946a27ed94c62c9f616f1c/564x318_1"},"views":1350,"time":"2022-02-27T13:47:35.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"12895167742326849596","duration":3850,"origin":"http://www.youtube.com/watch?v=-RH8MEoJunM","title":{"url":"https://twitter.yandex.com.tr/video/preview/12895167742326849596?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 12: Ecosystems \u0007[Security\u0007]"},"clear_title":"Security Engineering Lecture 12: Ecosystems Security","green":{"url":"http://www.youtube.com/watch?v=-RH8MEoJunM","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2F-RH8MEoJunM%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/-RH8MEoJunM?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=-RH8MEoJunM","detailUrl":"https://twitter.yandex.com.tr/video/preview/12895167742326849596?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=-RH8MEoJunM","providerName":"YouTube","url":"http://www.youtube.com/watch?v=-RH8MEoJunM","thumb":{"online":false,"duration":"1:04:10","image":"//avatars.mds.yandex.net/get-vthumb/3174341/dae5956eec946a27ed94c62c9f616f1c/564x318_1"},"views":1350,"time":"2022-02-27T13:47:35.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}},{"clear_description":"In this second lecture on hardware security, Sam moves on to his favourite topic: attacks and defences of computer processors. He explains how the tricks use...","description":"In this second lecture on hardware \u0007[security\u0007], Sam moves on to his favourite topic: attacks and defences of computer processors. He explains how the tricks use...","videoWidth":1280,"videoHeight":720,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/R01eBwIAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Security Engineering Lecture 9: Hardware Security 2","related_orig_text":"Security Engineering","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Security Engineering\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=RQzDqpi8154\",\"src\":\"serp\",\"rvb\":\"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_E6IVggQkAYAEKyqLARABGniBAgr6BvwFAPUBAwUHBP0BGwD8_vUDAwD79gX-BgT-AO38A_oD_wAABvsEDPsAAAAB9wEE9v0BAP4HBP4EAAAAEQQF-fgAAAAOAPwG_gEAAP3_AgYD_wAACvYBBgAAAAD8AQMF_v8AAP79_v0AAAAA_fP6BAAAAAAgAC3BWuA7OBNACUhOUAIqcxAAGmA1DQArCxL16uIz_wUP5B_s5yYOGuXi__PNABAk9CDvFO6uKPcAJuwkCLsAAAAT9vMu5gDtWOjN8fDROuPRxvT24H_mBCLF7Snv6wcGBAUh-Bz2LkkA9vvVGhzV3g42FhIgAC1I60E7OBNACUhvUAIqUxABGkD8DumlFPcA5gb7AeIUDg6__9v-9v4J-_oBFwPPJ_n59e31NuEGESQq6gAjEAcc-hYE7tv5GS7uIdsBgQslAuMHIAAtPjiDOzgTQA9IcVACMAk4AUoAYABoAA,,\"}","related_url":"http://www.youtube.com/watch?v=RQzDqpi8154","parent-reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-10-10-Z99D2E462EE8394B8","isVertical":false,"hasTranscription":false,"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","dups":[{"nonStopSupported":true,"filmId":"6998406427771070590","duration":2722,"origin":"http://www.youtube.com/watch?v=RQzDqpi8154","title":{"url":"https://twitter.yandex.com.tr/video/preview/6998406427771070590?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 9: Hardware \u0007[Security\u0007] 2"},"clear_title":"Security Engineering Lecture 9: Hardware Security 2","green":{"url":"http://www.youtube.com/watch?v=RQzDqpi8154","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FRQzDqpi8154%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/RQzDqpi8154?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=RQzDqpi8154","detailUrl":"https://twitter.yandex.com.tr/video/preview/6998406427771070590?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=RQzDqpi8154","providerName":"YouTube","url":"http://www.youtube.com/watch?v=RQzDqpi8154","thumb":{"online":false,"duration":"45:22","image":"//avatars.mds.yandex.net/get-vthumb/3645155/6e503f083d9870faa8f91eac8736ae7e/564x318_1"},"views":1660,"time":"2022-02-13T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"6998406427771070590","duration":2722,"origin":"http://www.youtube.com/watch?v=RQzDqpi8154","title":{"url":"https://twitter.yandex.com.tr/video/preview/6998406427771070590?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 9: Hardware \u0007[Security\u0007] 2"},"clear_title":"Security Engineering Lecture 9: Hardware Security 2","green":{"url":"http://www.youtube.com/watch?v=RQzDqpi8154","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FRQzDqpi8154%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/RQzDqpi8154?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=RQzDqpi8154","detailUrl":"https://twitter.yandex.com.tr/video/preview/6998406427771070590?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=RQzDqpi8154","providerName":"YouTube","url":"http://www.youtube.com/watch?v=RQzDqpi8154","thumb":{"online":false,"duration":"45:22","image":"//avatars.mds.yandex.net/get-vthumb/3645155/6e503f083d9870faa8f91eac8736ae7e/564x318_1"},"views":1660,"time":"2022-02-13T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}},{"clear_description":"Sam discusses the wildly different ways that discretionary and mandatory access controls work in real operating systems (Android, Windows, Linux and iOS), and the varying assumptions around...","description":"Sam discusses the wildly different ways that discretionary and mandatory access controls work in real operating systems (Android, Windows, Linux and iOS), and the varying assumptions around...","videoWidth":1280,"videoHeight":720,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/GpCj9AEAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Security Engineering Lecture 10: Operating Systems 1","related_orig_text":"Security Engineering","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Security Engineering\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=Hz_vomq8xAc\",\"src\":\"serp\",\"rvb\":\"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__8AAAD4_vkEDQX9ASrvAQn1BAQB7P0BBQkAAADp8_z8_P8AAAUAAAEEAAAAEfP-9fz_AgACBQgHBQAAAB35AvT9AAAACgb2Cf4BAAAECfQB-AIAAQ_-AQgAAAAA7wgDBv4AAAD-_P79AAAAAA359wYAAAAAIAAt4XDROzgTQAlITlACKnMQABpgMggAEfQMFu_tQePs_usj8_YpARDrBgAU2AAELfb0BiTuuQsHADHlHQTBAAAAF_ztMuYA61Hfzgjw7jvxz8_w8PF_6A0M9-gZ79Df8gndAwD8GEAgAOT_1w8u-tAmMOYKIAAtG6VOOzgTQAlIb1ACKlMQARpABRDwtPUCAusEBP3kEAwhwwPz-P0GCfwABhMH1CEF_f_k3iXr_fYOTPIEGxD9B_kPBvP8AyMc5wjt8IEGGA3n8yAALbAjkDs4E0APSHFQAjAJOAFKAGAAaAA,\"}","related_url":"http://www.youtube.com/watch?v=Hz_vomq8xAc","parent-reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-1-11-ZC654861B39D5130E","isVertical":false,"hasTranscription":false,"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","dups":[{"nonStopSupported":true,"filmId":"572594079742785173","duration":3592,"origin":"http://www.youtube.com/watch?v=Hz_vomq8xAc","title":{"url":"https://twitter.yandex.com.tr/video/preview/572594079742785173?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 10: Operating Systems 1"},"clear_title":"Security Engineering Lecture 10: Operating Systems 1","green":{"url":"http://www.youtube.com/watch?v=Hz_vomq8xAc","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FHz_vomq8xAc%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/Hz_vomq8xAc?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=Hz_vomq8xAc","detailUrl":"https://twitter.yandex.com.tr/video/preview/572594079742785173?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=Hz_vomq8xAc","providerName":"YouTube","url":"http://www.youtube.com/watch?v=Hz_vomq8xAc","thumb":{"online":false,"duration":"59:52","image":"//avatars.mds.yandex.net/get-vthumb/4222871/f24805fa66de2ed1b66fbd63e3f100c8/564x318_1"},"views":2359,"time":"2022-02-13T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"572594079742785173","duration":3592,"origin":"http://www.youtube.com/watch?v=Hz_vomq8xAc","title":{"url":"https://twitter.yandex.com.tr/video/preview/572594079742785173?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 10: Operating Systems 1"},"clear_title":"Security Engineering Lecture 10: Operating Systems 1","green":{"url":"http://www.youtube.com/watch?v=Hz_vomq8xAc","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FHz_vomq8xAc%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/Hz_vomq8xAc?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=Hz_vomq8xAc","detailUrl":"https://twitter.yandex.com.tr/video/preview/572594079742785173?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=Hz_vomq8xAc","providerName":"YouTube","url":"http://www.youtube.com/watch?v=Hz_vomq8xAc","thumb":{"online":false,"duration":"59:52","image":"//avatars.mds.yandex.net/get-vthumb/4222871/f24805fa66de2ed1b66fbd63e3f100c8/564x318_1"},"views":2359,"time":"2022-02-13T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}},{"clear_description":"In this first lecture on hardware security, Sam goes through the full gamut of techniques and attacks on real-world devices, from the bumping of physical locks through to shining laser beams at...","description":"In this first lecture on hardware \u0007[security\u0007], Sam goes through the full gamut of techniques and attacks on real-world devices, from the bumping of physical locks through to shining laser beams at...","videoWidth":1280,"videoHeight":720,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/x8VL8wEAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Security Engineering Lecture 8: Hardware Security 1","related_orig_text":"Security Engineering","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Security Engineering\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=31z2G027Y5I\",\"src\":\"serp\",\"rvb\":\"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_E68XggQkAYAEKyqLARABGniBAgr6BvwFAPUBAwUHBP0BGwD8_vUDAwDz-_38BwEAAOr0_P38_wAABvsEDPsAAAAO-_4K9_8AAP4HBP4EAAAAEQQF-fgAAAAJBvcI_gEAAP3_AgYD_wAAEfUCAQAAAAD8AQMF_v8AAP79_v0AAAAA_fP6BAAAAAAgAC3BWuA7OBNACUhOUAIqcxAAGmBFBgAkBgTy0OA74_QG5Bzz8yoRJ-rS_wzaAAgc9x7jDvieMhEAH9gNDbMAAAAO8NpQ3gDraeTB2OjkFeDMvwvw13_xAu_Y7EDe1QTLBxUK7x7wUzoA7P7CChff5QkyIwggAC1dTy47OBNACUhvUAIqUxABGkAEEPC1-vv_4gUABeERDRS6Bub5-gAIAv8DFAPTIwH89eTwLu4PDxY_4P0e9v8a-gsF9Ov6GyHvEev-gQYdA-bwIAAtBJWNOzgTQA9IcVACMAk4AUoAYABoAA,,\"}","related_url":"http://www.youtube.com/watch?v=31z2G027Y5I","parent-reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-4-9-Z8CBFC34A4BBBB565","isVertical":false,"hasTranscription":false,"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","dups":[{"nonStopSupported":true,"filmId":"2500345641454407945","duration":2991,"origin":"http://www.youtube.com/watch?v=31z2G027Y5I","title":{"url":"https://twitter.yandex.com.tr/video/preview/2500345641454407945?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 8: Hardware \u0007[Security\u0007] 1"},"clear_title":"Security Engineering Lecture 8: Hardware Security 1","green":{"url":"http://www.youtube.com/watch?v=31z2G027Y5I","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2F31z2G027Y5I%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/31z2G027Y5I?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=31z2G027Y5I","detailUrl":"https://twitter.yandex.com.tr/video/preview/2500345641454407945?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=31z2G027Y5I","providerName":"YouTube","url":"http://www.youtube.com/watch?v=31z2G027Y5I","thumb":{"online":false,"duration":"49:51","image":"//avatars.mds.yandex.net/get-vthumb/469690/b643fea5d03015c9df269a903a6af3fd/564x318_1"},"views":2426,"time":"2022-02-06T18:00:45.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"2500345641454407945","duration":2991,"origin":"http://www.youtube.com/watch?v=31z2G027Y5I","title":{"url":"https://twitter.yandex.com.tr/video/preview/2500345641454407945?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 8: Hardware \u0007[Security\u0007] 1"},"clear_title":"Security Engineering Lecture 8: Hardware Security 1","green":{"url":"http://www.youtube.com/watch?v=31z2G027Y5I","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2F31z2G027Y5I%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/31z2G027Y5I?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=31z2G027Y5I","detailUrl":"https://twitter.yandex.com.tr/video/preview/2500345641454407945?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=31z2G027Y5I","providerName":"YouTube","url":"http://www.youtube.com/watch?v=31z2G027Y5I","thumb":{"online":false,"duration":"49:51","image":"//avatars.mds.yandex.net/get-vthumb/469690/b643fea5d03015c9df269a903a6af3fd/564x318_1"},"views":2426,"time":"2022-02-06T18:00:45.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}},{"clear_description":"Security Engineering Lecture 7: Network Security - YouTube. Sam discusses how communications protocols can be subverted to cause harm in systems, along with how to protect systems connected on a...","description":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 7: Network \u0007[Security\u0007] - YouTube. Sam discusses how communications protocols can be subverted to cause harm in systems, along with how to protect systems connected on a...","videoWidth":1280,"videoHeight":720,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/rQ3s9QEAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Security Engineering Lecture 7: Network Security","related_orig_text":"Security Engineering","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Security Engineering\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=ywKVVlEwk1w\",\"src\":\"serp\",\"rvb\":\"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_AUA-wMDDQoI-wISAgT69gEBAPP7_fwHAQAA8vX_AQIAAAAK-wkKBwAAAAH3AQT2_QEAAgUIBwQAAAARBAX5-AAAAAUB_Qb_AQAA_f8CBgP_AAAK9gEGAAAAAPwMB_8CAAAA_v3-_QAAAAD77f7_AAAAACAALcFa4Ds4E0AJSE5QAipzEAAaYFwHABEfAujX40P5Ci3h_gf1NQcDwuT_DsoAICftF98S6KQVB_806SkCrQAAAB_r-EXZAOZuuOraAdcaA7u9CNTsf-oNFN_8OQ7h1_0TCfH4DAVbQgAAEqkSPt7iHjsJFCAALSBPJDs4E0AJSG9QAipTEAEaQAAG86QR9AfeBQIH3SkTJcEF1AT8_g7_7goV_M0r-PT2_vMa8QwPIhDMFSEVEST2Fgjy3PQoKfco1_WBCST84AsgAC0Go3w7OBNAD0hxUAIwCTgBSgBgAGgA\"}","related_url":"http://www.youtube.com/watch?v=ywKVVlEwk1w","parent-reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-8-12-Z75201429922FDE7B","isVertical":false,"hasTranscription":false,"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","dups":[{"nonStopSupported":true,"filmId":"16619876699264623812","duration":3007,"origin":"http://www.youtube.com/watch?v=ywKVVlEwk1w","title":{"url":"https://twitter.yandex.com.tr/video/preview/16619876699264623812?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 7: Network \u0007[Security\u0007]"},"clear_title":"Security Engineering Lecture 7: Network Security","green":{"url":"http://www.youtube.com/watch?v=ywKVVlEwk1w","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FywKVVlEwk1w%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/ywKVVlEwk1w?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=ywKVVlEwk1w","detailUrl":"https://twitter.yandex.com.tr/video/preview/16619876699264623812?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=ywKVVlEwk1w","providerName":"YouTube","url":"http://www.youtube.com/watch?v=ywKVVlEwk1w","thumb":{"online":false,"duration":"50:07","image":"//avatars.mds.yandex.net/get-vthumb/998548/bbf9377dd49008713057ecfaa9799f34/564x318_1"},"views":3671,"time":"2022-02-06T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"16619876699264623812","duration":3007,"origin":"http://www.youtube.com/watch?v=ywKVVlEwk1w","title":{"url":"https://twitter.yandex.com.tr/video/preview/16619876699264623812?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 7: Network \u0007[Security\u0007]"},"clear_title":"Security Engineering Lecture 7: Network Security","green":{"url":"http://www.youtube.com/watch?v=ywKVVlEwk1w","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FywKVVlEwk1w%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/ywKVVlEwk1w?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=ywKVVlEwk1w","detailUrl":"https://twitter.yandex.com.tr/video/preview/16619876699264623812?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=ywKVVlEwk1w","providerName":"YouTube","url":"http://www.youtube.com/watch?v=ywKVVlEwk1w","thumb":{"online":false,"duration":"50:07","image":"//avatars.mds.yandex.net/get-vthumb/998548/bbf9377dd49008713057ecfaa9799f34/564x318_1"},"views":3671,"time":"2022-02-06T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}},{"clear_description":"Ross discusses game theory including hawk-dove models and the prisoner's dilemma, and how they relate to rational actors reasoning about security. He explains why market forces and negative...","description":"Ross discusses game theory including hawk-dove models and the prisoner's dilemma, and how they relate to rational actors reasoning about \u0007[security\u0007]. He explains why market forces and negative...","videoWidth":852,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/cHJD8gEAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Security Engineering Lecture 5: The Economics of Security","related_orig_text":"Security Engineering","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Security Engineering\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=9_8G8HmKH6Q\",\"src\":\"serp\",\"rvb\":\"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-gYA9QEDBQcE_QELAPv79wAAAPP7_fwGAQAA9AD-_v8AAAAMBAQGAwAAAPz8BPv8_gAA_gcE_wQAAAARBAX6-AAAAA4A_Ab-AQAA9v_0AgP_AAAW-v4MAAAAAPn9CgUBAAAA9v399wAAAAAD8vz8AAAAACAALSv14zs4E0AJSE5QAipzEAAaYFAGAC4JCPTu3WniCwTnFfTkLAYY29v_KdIA9zL49OAe5ptS9_8KziH0pQAAACHY90O_ANJ8wdvN_vkZ3c-05t8Cfwkm7b7MLgXhyPwHEhwBHPZURwAQD6sMPMDGQBU2GyAALYwYFTs4E0AJSG9QAipTEAEaQO8E26sX8xXrBesE5ED-Hsb5zPr9-Q776gcU_cor-f388N1P9R0NJBDnFBwrBwf8GhvlzfsmOeYg1hOBAiUB4QggAC0-nWk7OBNAD0hxUAIwCTgBSgBgAGgA\"}","related_url":"http://www.youtube.com/watch?v=9_8G8HmKH6Q","parent-reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-11-9-Z4F971174ED181EA1","isVertical":false,"hasTranscription":false,"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","dups":[{"nonStopSupported":true,"filmId":"10062379656545679927","duration":3315,"origin":"http://www.youtube.com/watch?v=9_8G8HmKH6Q","title":{"url":"https://twitter.yandex.com.tr/video/preview/10062379656545679927?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 5: The Economics of \u0007[Security\u0007]"},"clear_title":"Security Engineering Lecture 5: The Economics of Security","green":{"url":"http://www.youtube.com/watch?v=9_8G8HmKH6Q","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2F9_8G8HmKH6Q%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/9_8G8HmKH6Q?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=9_8G8HmKH6Q","detailUrl":"https://twitter.yandex.com.tr/video/preview/10062379656545679927?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=9_8G8HmKH6Q","providerName":"YouTube","url":"http://www.youtube.com/watch?v=9_8G8HmKH6Q","thumb":{"online":false,"duration":"55:15","image":"//avatars.mds.yandex.net/get-vthumb/2883521/416a9a070e36a518459235e2fc6212ff/564x318_1"},"views":1954,"time":"2022-01-30T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"10062379656545679927","duration":3315,"origin":"http://www.youtube.com/watch?v=9_8G8HmKH6Q","title":{"url":"https://twitter.yandex.com.tr/video/preview/10062379656545679927?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 5: The Economics of \u0007[Security\u0007]"},"clear_title":"Security Engineering Lecture 5: The Economics of Security","green":{"url":"http://www.youtube.com/watch?v=9_8G8HmKH6Q","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2F9_8G8HmKH6Q%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/9_8G8HmKH6Q?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=9_8G8HmKH6Q","detailUrl":"https://twitter.yandex.com.tr/video/preview/10062379656545679927?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=9_8G8HmKH6Q","providerName":"YouTube","url":"http://www.youtube.com/watch?v=9_8G8HmKH6Q","thumb":{"online":false,"duration":"55:15","image":"//avatars.mds.yandex.net/get-vthumb/2883521/416a9a070e36a518459235e2fc6212ff/564x318_1"},"views":1954,"time":"2022-01-30T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}},{"type":"video_direct","groudId":"10","directId":"R-I-113683-5","isFake":true},{"clear_description":"Ross looks at the wide history of banking, as a case study of what goes wrong in systems when attackers are capable and motivated.","description":"Ross looks at the wide history of banking, as a case study of what goes wrong in systems when attackers are capable and motivated.","videoWidth":854,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/cHZD7wEAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Security Engineering Lecture 3: Banking Security 1","related_orig_text":"Security Engineering","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Security Engineering\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=qVXa3_MISzY\",\"src\":\"serp\",\"rvb\":\"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_E7AdggQkAYAEKyqLARABGniBAgr6BvwFAPsDAw0KCPsCE_39APYBAQDz-_38BwEAAPf5APcBAAAADAUEBgMAAAAJ_QP_-P4BAP__B_kEAAAAEQj4_fcAAAAGCQEJ_gEAAAH7_A8E_wAACvYBBgAAAAD3Awv8AQAAAAD1_vgAAAAAAPH6DAAAAAAgAC3BWuA7OBNACUhOUAIqcxAAGmBHBQA7_wgcz8xY3QgG1xH58AYyJ-vs_x_4ADIX3A_oN_upLAEA878YHKwAAAAS6cJM3QDGcemu5gDlALzDuf3K_X_wK_TB3i8Iwd_eDQ8CDxT2LyUA5x-2HjfV7CJA9QQgAC2ybx07OBNACUhvUAIqUxABGkAHB_OuCQQJ7gUEAOgSDxXBB-P8-voGA_wCFQLTIv8A-uDrKfUfDh4l6AsfDvoX-RYG8uf9FyjuD_EJgQAZDubzIAAtIV2QOzgTQA9IcVACMAk4AUoAYABoAA,,\"}","related_url":"http://www.youtube.com/watch?v=qVXa3_MISzY","parent-reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-5-12-Z12CCF154CA7A2142","isVertical":false,"hasTranscription":false,"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","dups":[{"nonStopSupported":true,"filmId":"8420402231339563110","duration":3760,"origin":"http://www.youtube.com/watch?v=qVXa3_MISzY","title":{"url":"https://twitter.yandex.com.tr/video/preview/8420402231339563110?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 3: Banking \u0007[Security\u0007] 1"},"clear_title":"Security Engineering Lecture 3: Banking Security 1","green":{"url":"http://www.youtube.com/watch?v=qVXa3_MISzY","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FqVXa3_MISzY%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/qVXa3_MISzY?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=qVXa3_MISzY","detailUrl":"https://twitter.yandex.com.tr/video/preview/8420402231339563110?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=qVXa3_MISzY","providerName":"YouTube","url":"http://www.youtube.com/watch?v=qVXa3_MISzY","thumb":{"online":false,"duration":"1:02:40","image":"//avatars.mds.yandex.net/get-vthumb/1469132/a99e826345472822b6eb35849032fd7e/564x318_1"},"views":5070,"time":"2022-01-23T23:44:24.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"8420402231339563110","duration":3760,"origin":"http://www.youtube.com/watch?v=qVXa3_MISzY","title":{"url":"https://twitter.yandex.com.tr/video/preview/8420402231339563110?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 3: Banking \u0007[Security\u0007] 1"},"clear_title":"Security Engineering Lecture 3: Banking Security 1","green":{"url":"http://www.youtube.com/watch?v=qVXa3_MISzY","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FqVXa3_MISzY%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/qVXa3_MISzY?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=qVXa3_MISzY","detailUrl":"https://twitter.yandex.com.tr/video/preview/8420402231339563110?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=qVXa3_MISzY","providerName":"YouTube","url":"http://www.youtube.com/watch?v=qVXa3_MISzY","thumb":{"online":false,"duration":"1:02:40","image":"//avatars.mds.yandex.net/get-vthumb/1469132/a99e826345472822b6eb35849032fd7e/564x318_1"},"views":5070,"time":"2022-01-23T23:44:24.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}},{"clear_description":"Ross looks at a variety of attacks on payment cards, online banking, API attacks on banking protocols and open banking, and two-factor authentication and sim...","description":"Ross looks at a variety of attacks on payment cards, online banking, API attacks on banking protocols and open banking, and two-factor authentication and sim...","videoWidth":854,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/WFS1-gEAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Security Engineering Lecture 4: Banking Security 2","related_orig_text":"Security Engineering","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Security Engineering\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=QwZ4FbbECqo\",\"src\":\"serp\",\"rvb\":\"EqoCChM5MjAwNzQ0NDg5Njc3NDM0NDcxChM2NTc1OTAzODIxNzU1NDgzOTY5ChM5NTg2MzgyNDMzMDk2NTYyNzczChQxMjg5NTE2Nzc0MjMyNjg0OTU5NgoTNjk5ODQwNjQyNzc3MTA3MDU5MAoSNTcyNTk0MDc5NzQyNzg1MTczChMyNTAwMzQ1NjQxNDU0NDA3OTQ1ChQxNjYxOTg3NjY5OTI2NDYyMzgxMgoUMTAwNjIzNzk2NTY1NDU2Nzk5MjcKEzg0MjA0MDIyMzEzMzk1NjMxMTAKEzkzMjE1ODU3NTgwMDkzMTQxMzkKEzg1ODg4MDQ3NjI1NzYxOTM3NTUKFDE1MTk0MjA0MDQ0NjM3MTEwMjUzChQxMDcwNTIxNzM3ODMxMjU0ODI4NRoVChM5MzIxNTg1NzU4MDA5MzE0MTM5WhM5MzIxNTg1NzU4MDA5MzE0MTM5aq4DEgEwGAAiRRoxAAoqaGhtZHF3cm96Y21yeGNoYmhoVUNSdzI1SFZqMVJ2bDJYY0VIZGo0UEtnEgIAEioQwg8PGg8_E58YggQkAYAEKyqLARABGniBBgUBCfwEAPb5BgkNBvwBFQYFAvYCAgDt_QEECQAAAPf5APcBAAAABAIIBQIAAAAB_gID_v4BAP4HBP4EAAAAEQQG-fgAAAAKBvcI_gEAAPb-AwQDAAAACvYBBgAAAAD6BgEGBAEAAAP7BfcAAAAAAPH6DAAAAAAgAC3QNd87OBNACUhOUAIqcxAAGmAuCwApFQwn1cc78vwY3AXs9Q8eF-v1ACcFAB8c5QP6IgS7DPL_-dgQAL0AAAANAcE52ADiVurT6AjxEtvOwfbS_38BKfrY6SID4OnX-RP_CQXzHioA7QvLGUnZ8xc4CfogAC2VMEQ7OBNACUhvUAIqUxABGkD-BfKmGwQN9Af9AOwXBRDMCNv-_PkIAfcCFf_QJfj-9_L2KvUbDx0T7hEjI_0g-x8J89z9FzTpG-ALgQEdCuT5IAAtFZGJOzgTQA9IcVACMAk4AUoAYABoAA,,\"}","related_url":"http://www.youtube.com/watch?v=QwZ4FbbECqo","parent-reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-4-11-ZE7464156A3BB11EE","isVertical":false,"hasTranscription":false,"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","dups":[{"nonStopSupported":true,"filmId":"9321585758009314139","duration":3103,"origin":"http://www.youtube.com/watch?v=QwZ4FbbECqo","title":{"url":"https://twitter.yandex.com.tr/video/preview/9321585758009314139?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 4: Banking \u0007[Security\u0007] 2"},"clear_title":"Security Engineering Lecture 4: Banking Security 2","green":{"url":"http://www.youtube.com/watch?v=QwZ4FbbECqo","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FQwZ4FbbECqo%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/QwZ4FbbECqo?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=QwZ4FbbECqo","detailUrl":"https://twitter.yandex.com.tr/video/preview/9321585758009314139?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=QwZ4FbbECqo","providerName":"YouTube","url":"http://www.youtube.com/watch?v=QwZ4FbbECqo","thumb":{"online":false,"duration":"51:43","image":"//avatars.mds.yandex.net/get-vthumb/773887/91f363e5b61e70a7874c3f550059db27/564x318_1"},"views":2846,"time":"2022-01-23T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"9321585758009314139","duration":3103,"origin":"http://www.youtube.com/watch?v=QwZ4FbbECqo","title":{"url":"https://twitter.yandex.com.tr/video/preview/9321585758009314139?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 4: Banking \u0007[Security\u0007] 2"},"clear_title":"Security Engineering Lecture 4: Banking Security 2","green":{"url":"http://www.youtube.com/watch?v=QwZ4FbbECqo","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FQwZ4FbbECqo%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/QwZ4FbbECqo?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=QwZ4FbbECqo","detailUrl":"https://twitter.yandex.com.tr/video/preview/9321585758009314139?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=QwZ4FbbECqo","providerName":"YouTube","url":"http://www.youtube.com/watch?v=QwZ4FbbECqo","thumb":{"online":false,"duration":"51:43","image":"//avatars.mds.yandex.net/get-vthumb/773887/91f363e5b61e70a7874c3f550059db27/564x318_1"},"views":2846,"time":"2022-01-23T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}},{"clear_description":"Ross discusses how to model real-world threats, including the specifications of threat models and security policies, and what goes wrong in practice in several examples.","description":"Ross discusses how to model real-world threats, including the specifications of threat models and \u0007[security\u0007] policies, and what goes wrong in practice in several examples.","videoWidth":852,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/HQKc7QEAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Security Engineering Lecture 2: Threat Models and Security Policies","related_orig_text":"Security Engineering","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Security Engineering\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=GDwbNs3J4ec\",\"src\":\"serp\",\"rvb\":\"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_E-UaggQkAYAEKyqLARABGniBABD6-_0EAPb5BgkOBvwBHAD8_vQDAwD7BQEICAT-AO_8APT5AAAAC_sJCgcAAAAI9vf-9_4AAPkHAAP7AAAADvr89fYAAAACC_gG_gEAAPb_AP35AQAADv4BCAAAAAD2BP8A__8AAPwD_vYBAAAAAPX0_gAAAAAgAC2Teds7OBNACUhOUAIqcxAAGmBCAwAvEBQP5uFV4f0I3Qbv7R8DDdLyAC7zABMf5PQWDfSbEfn_LLINDK4AAAAc7eBK7ADWbtTnyObnEtbUlP_jEn_mKRfi4zjozcj5_g7wEgv2CDoA-QeyHDvT5hc6GAwgAC1BtCY7OBNACUhvUAIqUxABGkAOEPqnD_wW6wULA-8RChvIDtb8AfoI__wFF_7RJPwD--zoMPMhHR8R8wsYFPsc-xQF6dvyECjyF-4NgQMhC-TyIAAth8aKOzgTQA9IcVACMAk4AUoAYABoAA,,\"}","related_url":"http://www.youtube.com/watch?v=GDwbNs3J4ec","parent-reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-11-5-Z61CC3F03652E7E20","isVertical":false,"hasTranscription":false,"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","dups":[{"nonStopSupported":true,"filmId":"8588804762576193755","duration":3429,"origin":"http://www.youtube.com/watch?v=GDwbNs3J4ec","title":{"url":"https://twitter.yandex.com.tr/video/preview/8588804762576193755?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 2: Threat Models and \u0007[Security\u0007] Policies"},"clear_title":"Security Engineering Lecture 2: Threat Models and Security Policies","green":{"url":"http://www.youtube.com/watch?v=GDwbNs3J4ec","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FGDwbNs3J4ec%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/GDwbNs3J4ec?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=GDwbNs3J4ec","detailUrl":"https://twitter.yandex.com.tr/video/preview/8588804762576193755?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=GDwbNs3J4ec","providerName":"YouTube","url":"http://www.youtube.com/watch?v=GDwbNs3J4ec","thumb":{"online":false,"duration":"57:09","image":"//avatars.mds.yandex.net/get-vthumb/2003801/3fa29b1056b38ee2d0b907d032087636/564x318_1"},"views":8436,"time":"2022-01-17T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"8588804762576193755","duration":3429,"origin":"http://www.youtube.com/watch?v=GDwbNs3J4ec","title":{"url":"https://twitter.yandex.com.tr/video/preview/8588804762576193755?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 2: Threat Models and \u0007[Security\u0007] Policies"},"clear_title":"Security Engineering Lecture 2: Threat Models and Security Policies","green":{"url":"http://www.youtube.com/watch?v=GDwbNs3J4ec","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FGDwbNs3J4ec%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/GDwbNs3J4ec?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=GDwbNs3J4ec","detailUrl":"https://twitter.yandex.com.tr/video/preview/8588804762576193755?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=GDwbNs3J4ec","providerName":"YouTube","url":"http://www.youtube.com/watch?v=GDwbNs3J4ec","thumb":{"online":false,"duration":"57:09","image":"//avatars.mds.yandex.net/get-vthumb/2003801/3fa29b1056b38ee2d0b907d032087636/564x318_1"},"views":8436,"time":"2022-01-17T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}},{"clear_description":"In this first lecture of Security Engineering (https://www.cl.cam.ac.uk/~rja14/book...., Ross looks at the various kinds of attacker and their capabilities: the crooks, state actors, corporate...","description":"In this first lecture of \u0007[Security\u0007] \u0007[Engineering\u0007] (https://www.cl.cam.ac.uk/~rja14/book...., Ross looks at the various kinds of attacker and their capabilities: the crooks, state actors, corporate...","videoWidth":1280,"videoHeight":720,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/nqab7QEAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Security Engineering Lecture 1: Who is the Opponent? - Ross Anderson and Sam Ainsworth","related_orig_text":"Security Engineering","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Security Engineering\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=o1x_Oa0XiDI\",\"src\":\"serp\",\"rvb\":\"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-CBCQBgAQrKosBEAEaeIEKEfsB_wIA9PwIB_gF_gECDAD_9___AOb5-wr4_QEA9QYGAQEAAAAE-AgEAAAAAAj29_73_gAAEgYEBQQAAAAT-QL_9wAAAA4M_AP-AQAA-Pf3_QP_AAATBAH9_wAAAPwBAwb-_wAA-gIEBwAAAAAD8AAFAAEAACAALZ571zs4E0AJSE5QAipzEAAaYFH_AP7UCRbStUPj1frKA_oNKwYq1-3_Gcz_Gxrf8_wG540o5P8NzfMDogAAADfV1y7-AP1_37jK-t0QCsPA--oTfuIH6bO_EQ-5_rveGAMd_9ROOwDdNbQZPtjnMSMQIyAALQPbFjs4E0AJSG9QAipTEAEaQAf_6aIQBhXlBAP_6hcGHcMN1f789Qz8_QMZ_c8n-QH62-JD-CcQKxDtBx4e-gn6Dwnp0PodLOwW-xGBBiUG5OwgAC3nCoA7OBNAD0hxUAIwCTgBSgBgAGgA\"}","related_url":"http://www.youtube.com/watch?v=o1x_Oa0XiDI","parent-reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-2-17-ZCF7DC878A4252B91","isVertical":false,"hasTranscription":true,"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","dups":[{"nonStopSupported":true,"filmId":"15194204044637110253","duration":4083,"origin":"http://www.youtube.com/watch?v=o1x_Oa0XiDI","title":{"url":"https://twitter.yandex.com.tr/video/preview/15194204044637110253?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 1: Who is the Opponent? - Ross Anderson and Sam Ainsworth"},"clear_title":"Security Engineering Lecture 1: Who is the Opponent? - Ross Anderson and Sam Ainsworth","green":{"url":"http://www.youtube.com/watch?v=o1x_Oa0XiDI","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2Fo1x_Oa0XiDI%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/o1x_Oa0XiDI?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=o1x_Oa0XiDI","detailUrl":"https://twitter.yandex.com.tr/video/preview/15194204044637110253?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=o1x_Oa0XiDI","providerName":"YouTube","url":"http://www.youtube.com/watch?v=o1x_Oa0XiDI","thumb":{"online":false,"duration":"1:08:03","image":"//avatars.mds.yandex.net/get-vthumb/3413282/4a4aae503ea711e50030d9e108d8cb97/564x318_1"},"views":20184,"time":"2022-01-16T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"15194204044637110253","duration":4083,"origin":"http://www.youtube.com/watch?v=o1x_Oa0XiDI","title":{"url":"https://twitter.yandex.com.tr/video/preview/15194204044637110253?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 1: Who is the Opponent? - Ross Anderson and Sam Ainsworth"},"clear_title":"Security Engineering Lecture 1: Who is the Opponent? - Ross Anderson and Sam Ainsworth","green":{"url":"http://www.youtube.com/watch?v=o1x_Oa0XiDI","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2Fo1x_Oa0XiDI%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/o1x_Oa0XiDI?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=o1x_Oa0XiDI","detailUrl":"https://twitter.yandex.com.tr/video/preview/15194204044637110253?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=o1x_Oa0XiDI","providerName":"YouTube","url":"http://www.youtube.com/watch?v=o1x_Oa0XiDI","thumb":{"online":false,"duration":"1:08:03","image":"//avatars.mds.yandex.net/get-vthumb/3413282/4a4aae503ea711e50030d9e108d8cb97/564x318_1"},"views":20184,"time":"2022-01-16T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}},{"clear_description":"Ross and Sam discuss what Security Engineering is all about, by reference to some of the great disasters in Safety and Security. Book: https://www.cl.cam.ac.uk/~rja14/book....","description":"Ross and Sam discuss what \u0007[Security\u0007] \u0007[Engineering\u0007] is all about, by reference to some of the great disasters in Safety and \u0007[Security\u0007]. Book: https://www.cl.cam.ac.uk/~rja14/book....","videoWidth":1280,"videoHeight":720,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/rdA5-AEAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Security Engineering: Trailer","related_orig_text":"Security Engineering","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Security Engineering\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=2qNlv435L5g\",\"src\":\"serp\",\"rvb\":\"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_AUA-wMDDQoI-wIGBvgA9___APn9_gMFAv8A7_wA9PkAAAAM_wwG_AAAAAH3AQT2_QEA-f8DAAQAAAAH-gb59QAAAA4A_Ab-AQAA_wABAvsCAAEPAwcPAAAAAPYHCAP__wAAAPX--AAAAAAA8foMAAAAACAALcFa4Ds4E0AJSE5QAipzEAAaYBUTAB0HDwrj-Snu_BXyCPD5Cxf39_0AE_EAExHx9hARAOQP_wAK9Bf42gAAAAj26R77ANwy993l__UL9fTl_-MCf_8S_wnhD-bc4tj0CAIZEwUOCADtBe8RFOz4CwkSEyAALV9wlDs4E0AJSG9QAipTEAEaQAwIEbgH8w3aA_0A4xMPGL8O3vz6Agb9-gIV-dUj_QT69_4S-A4SGyPdCRsECBX3CALz2gMVCwYV9vyBAx8G5_YgAC2cc5Y7OBNAD0hxUAIwCTgBSgBgAGgA\"}","related_url":"http://www.youtube.com/watch?v=2qNlv435L5g","parent-reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-7-7-ZF9F6CDBC806E8DEF","isVertical":false,"hasTranscription":false,"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","dups":[{"nonStopSupported":true,"filmId":"10705217378312548285","duration":448,"origin":"http://www.youtube.com/watch?v=2qNlv435L5g","title":{"url":"https://twitter.yandex.com.tr/video/preview/10705217378312548285?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007]: Trailer"},"clear_title":"Security Engineering: Trailer","green":{"url":"http://www.youtube.com/watch?v=2qNlv435L5g","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2F2qNlv435L5g%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/2qNlv435L5g?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=2qNlv435L5g","detailUrl":"https://twitter.yandex.com.tr/video/preview/10705217378312548285?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=2qNlv435L5g","providerName":"YouTube","url":"http://www.youtube.com/watch?v=2qNlv435L5g","thumb":{"online":false,"duration":"7:28","image":"//avatars.mds.yandex.net/get-vthumb/3284947/207ad21d35268fbeb3e41abaf1a9b6e2/564x318_1"},"views":4370,"time":"2022-01-14T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"10705217378312548285","duration":448,"origin":"http://www.youtube.com/watch?v=2qNlv435L5g","title":{"url":"https://twitter.yandex.com.tr/video/preview/10705217378312548285?how=tm&text=Security%2BEngineering","text":"\u0007[Security\u0007] \u0007[Engineering\u0007]: Trailer"},"clear_title":"Security Engineering: Trailer","green":{"url":"http://www.youtube.com/watch?v=2qNlv435L5g","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x4add4491140/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2F2qNlv435L5g%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/2qNlv435L5g?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=2qNlv435L5g","detailUrl":"https://twitter.yandex.com.tr/video/preview/10705217378312548285?how=tm&text=Security%2BEngineering","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=2qNlv435L5g","providerName":"YouTube","url":"http://www.youtube.com/watch?v=2qNlv435L5g","thumb":{"online":false,"duration":"7:28","image":"//avatars.mds.yandex.net/get-vthumb/3284947/207ad21d35268fbeb3e41abaf1a9b6e2/564x318_1"},"views":4370,"time":"2022-01-14T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","verified":false,"interactive":true}}]},"page":0},"prevention":{},"hasNextPage":false,"rightSerpItems":[],"quasarData":{"title":""},"isAdultQuery":false,"errorList":[],"layout":"list"},"main":{"_isInitial":true,"snippets":[],"serpFooter":{"linksGroups":[]}},"feed":{"_isInitial":true,"snippets":[],"nextPageLoadStatus":"initial","paginationRequest":"","shouldRemountPrevPlayer":false}},"internal":{"nonce":"3412303870553965797721","expFlags":{"video_instream_player_yaru_loader":1,"video_skeleton_doc_update":1,"velocity_delay_drawer":1,"video_instream_disable_hosts":"dzen.ru,ok.ru,vk.com,video.mail.ru","video_search_toggle_with_text":1,"video_single_vh_unmute":1,"video_update_d2d_after_clickout":1,"velocity_disable_suspense":1,"dark_theme_desktop":"cookie","video_instream_player_config":{"vmapScenarioId":8,"category":1,"impId":6,"partnerId":2216089,"title":"Security Engineering: Trailer"},"video_font_yandex_sans":1,"video_resource_loader":1,"video_skeleton_direct_under_player_update":1,"video_vh_player_js":0,"video_dzc":1,"video_masthead_ratio":"180,4","video_searchdata_scheme":1,"video_single_vh_iframe":1,"velocity_delay_metrika":1,"video_partner_label":1,"video_direct_render_in_viewport":1,"velocity_video_track_css_cache_hit":1,"video_skeleton_instream_update":1,"video_resource_loader_load_timeout":6000,"video_viewer_catch_sandbox_early_inits":1,"mmui_extended_escape_scheme":"searchdata.clips.0.authorname","spok":"id","video_search_grid_direct_repeat":6,"video_direct_config_desktop_search":"search-grid-row:R-I-48058-718:R-I-474674-109,search-grid-head:R-I-2120168-7","init_meta":{"ask-user-purchase-history":1,"use-src-videoquickp":1,"enable-begemot":1,"begemot-enable-cancelled-misspell":1,"enable_masthead":1,"use-src-videop":1,"use-src-videoquickp_misspell":1,"enable_blackbox_multisession":1,"begemot-enable-cancelled-misspell-rtmr":1,"enable_video_iron_fetcher":1,"use-related-only":1,"ask-yandex-io-devices":1,"use-images-device-setup":1,"use-src-imagesp":1,"images-apphost-collections-front":1,"enable_aab_apphost":1,"graph-is-video-search":1,"use-src-imagesp_misspell":1,"use-src-imagesultrap":1,"use-video-apphost-pre-templates":1,"use-src-videop_misspell":1,"use-video-apphost-post-templates":1,"use-src-imagesquickp":1,"enable_video_carousels":"1","restrict-max-docs":"1000","use-images-region-setup":1,"use-post-auto2":1,"use-images-settings-setup":1,"use-src-ugc_favorites":1,"video_vitrina_disable":"0","use-images-user-setup":1,"use-video-pre-search-data":1,"begemot-no-suggest-history":1},"video_skeleton_direct_organic_update":1,"video_blender":1,"video_search_grid_enable":0,"video_search_grid_direct_start":3,"video_instream_players_yaru_enable":1,"video_redirect_plug":2,"video_disable_serp_dzc":1,"video_direct_pos_id":"R-I-48058-73","dark_theme_desktop_default_pref":"system","video_search_toggle_enable":1,"video_viewer_desktop_blocks":1,"velocity_split_hydration":4,"video_duration_counter_new_format":1,"video_thumb_poster_full":1,"video_scrollpages":2,"video_serp_desktop_block_design":1,"velocity_video_inline_css":3,"video_direct_pos":5,"video_direct_viewport_margin_desktop":700},"slots":["1092870,0,13;66285,0,80;1103958,0,10;1103539,0,33;1078435,0,57;1058431,0,76;1079140,0,55;1084780,0,67;1104216,0,23;1034464,0,74;1101327,0,85;1106432,0,1;1088256,0,0;1104658,0,22;1106104,0,86;43962,0,62;1106425,0,27;1101493,0,17;1101198,0,90;1093998,0,67;1080576,0,89;1106633,0,65;1107141,0,95;1101506,0,71;899196,0,3;90500,0,58;1097905,0,30;1086599,0,52;1102568,0,65;1102750,0,77;1095571,0,70;1102551,0,73;332148,0,79;1107736,0,99;46453,0,72;1101988,0,48;1107616,0,77;151171,0,27;126308,0,30;126331,0,98;287509,0,27;1103277,0,69;777799,0,3;1051465,0,25;912285,0,20"],"isYandexNet":false,"platform":"desktop","isEnLogo":true,"retpath":"https%3A%2F%2Ftwitter.yandex.com.tr%2Fvideo%2Fsearch%3FchannelId%3Dd3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%253D%253D%26how%3Dtm%26text%3DSecurity%2BEngineering","mordaUrl":"//yandex.com.tr/","videoSearchUrl":"https://twitter.yandex.com.tr/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","settingsUrl":"https://yandex.com.tr/tune/search/","helpUrl":"https://yandex.com.tr/support/video/","legalUrl":"//legal.yandex.com.tr/termsofuse/","feedbackUrl":"https://yandex.com.tr/support/video/troubleshooting.html","basename":"/video","currentPageName":"search","isYandexApp":false,"isYandexAppAndroid":false,"isYandexAppIos":false,"isAndroid":false,"isHamster":false,"serpid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","backUrl":"//ya.ru","url":"https://twitter.yandex.com.tr/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","isIntegrationTest":false,"shouldDropLogs":false,"seo":{"title":"Security Engineering: 14 video Yandex'te bulundu","description":"\"Security Engineering\" sorgusu için arama sonuçları Yandex'te","shareTitle":"Security Engineering — Yandex video arama","keywords":"yandex video, video araması, çevrimiçi izle, dizi, film, müzik klipleri","hasPorno":0},"isEmbedded":false,"isPumpkin":false,"quasarCsrfToken":"y8e008c768aaad1b0c73f24795bba47d5","reportFeedbackBaseProps":{"initEmail":"","metaFields":{"userAgent":"Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)","userTestids":"191768,223386,238743,246500,257621,253288,265553,270072,277807,274239,294077,278842,299121,313103,331010,338398,378416,359879,415420,644350,652605,645301,679708,689693,690449,696466,696473,722746,740796,769020,776165,777765,771230,781521,790415,801982,851450,878348,886706,883477,900639,931367,937268,969063,935488,945314,989988,982463,991363,990185,1015567,1011895,1035320,1033956,1035241,1036046,1068593,1087297,1089355,1060131,1076329,1099741,1103590,1095365,1071879,1092870,66285,1103958,1088256,1104658,1106104,43962,90500,1097905,46453","yandexuid":"1539657971725950441","uid":"0","queryText":"Security Engineering","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL"}},"userTestids":"191768,223386,238743,246500,257621,253288,265553,270072,277807,274239,294077,278842,299121,313103,331010,338398,378416,359879,415420,644350,652605,645301,679708,689693,690449,696466,696473,722746,740796,769020,776165,777765,771230,781521,790415,801982,851450,878348,886706,883477,900639,931367,937268,969063,935488,945314,989988,982463,991363,990185,1015567,1011895,1035320,1033956,1035241,1036046,1068593,1087297,1089355,1060131,1076329,1099741,1103590,1095365,1071879,1092870,66285,1103958,1088256,1104658,1106104,43962,90500,1097905,46453","regionId":20815,"isYaRu":false,"shouldUnmountSearchPageInViewer":false,"videoGlobalContext":{"platform":"desktop","isPumpkin":false,"language":"tr","user_time":{"epoch":"1725950441","tz":"America/Louisville","to_iso":"2024-09-10T02:40:41-0400","__is_plain":1},"isQuasarEnabled":false,"isHermione":false,"shouldStubImages":false,"enableVideoPreviewInHermione":false,"reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","isEmbedded":false,"shouldDailyClickoutDzenInSerp":false,"shouldDailyClickoutDzenInViewer":true,"shouldDisableWebp":false,"removeLinkPrefix":"/video","shouldUseHighresPreview":true,"shouldCutSnippetTitle":true,"shouldShowPlusBadge":true,"reportFeedbackBaseProps":{"initEmail":"","metaFields":{"userAgent":"Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)","userTestids":"191768,223386,238743,246500,257621,253288,265553,270072,277807,274239,294077,278842,299121,313103,331010,338398,378416,359879,415420,644350,652605,645301,679708,689693,690449,696466,696473,722746,740796,769020,776165,777765,771230,781521,790415,801982,851450,878348,886706,883477,900639,931367,937268,969063,935488,945314,989988,982463,991363,990185,1015567,1011895,1035320,1033956,1035241,1036046,1068593,1087297,1089355,1060131,1076329,1099741,1103590,1095365,1071879,1092870,66285,1103958,1088256,1104658,1106104,43962,90500,1097905,46453","yandexuid":"1539657971725950441","uid":"0","queryText":"Security Engineering","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL"}},"deviceDetect":{"OSFamily":"Unknown","isTV":0,"x64":0,"GoogleToolBarVersion":"","MultiTouch":0,"BrowserBase":"","YandexBarVersion":"","isTablet":0,"YandexBar":0,"isTouch":0,"isMobile":0,"DeviceKeyboard":"","device":"desktop","historySupport":0,"BrowserShellVersion":"","DeviceVendor":"","isBrowser":1,"hasFlash":0,"MailRuSputnikVersion":"","isSameSiteSupported":0,"BrowserBaseVersion":"","BrowserVersionRaw":"","DeviceId":"","error":"","MailRuAgent":0,"ScreenWidth":0,"inAppBrowser":0,"hasHTML5":0,"isEmulator":0,"J2ME":0,"MailRuAgentVersion":"","BrowserEngineVersionRaw":"537.36","isRobot":0,"__is_plain":1,"BrowserEngineVersion":"0537.0036","BrowserName":"","DeviceModel":"","BrowserEngine":"WebKit","DeviceName":"","OSVersionRaw":"","OSName":"","GoogleToolBar":0,"ScreenSize":"","MailRuSputnik":0,"YaBuildName":"","PreferMobile":0,"DesktopMode":0,"isWAP":0,"BrowserVersion":"","BitsPerPixel":0,"BrowserShell":"","YaGUI":"","isBeta":0,"OSVersion":"","ScreenHeight":0},"nonce":"3412303870553965797721"},"viewer":{"videoId":"","isHermione":false}},"user":{"tld":"com.tr","isEuDomain":false,"login":"","passportId":"","isLoggedIn":false,"locationName":"Columbus","isFamily":false,"yandexuid":"1539657971725950441","ugcCsrfToken":"","family":1,"isChild":false},"config":{"skinMode":"system","skin":"light","version":"releases/frontend/video/v1.1428.0#8505a2ed3c895acb57d34dcff50d715adb17d602","isGridSupported":false,"advConfig":{},"advExpConfig":{}},"counters":{"params":{"useBeacon":false,"clickHost":"twitter.yandex.com.tr/clck","pid":197},"dict":{"serp":"471","pager":"405","down":"601","up":"600","footer":"295","more":"75","page":"143","loaded":"1007","grid":"3223","support":"2458","client":"2989","layout":"54","list":"436","fallback":"2010","duration":"2136","within":"3247","on":"10","off":"11","host":"3052","init":"1309","supported":"3761","video":"231","translation":"347","distrib":"316","onboarding":"2045","shown":"3780","filters":"618","hide":"1656","lang":"1144","link":"513","click":"882","advanced":"255","open":"842","close":"486","apply":"2461","reset":"3236","short":"142","toggle":"237","snippet":"254","item":"22","icon":"1167","abuse":"1436","submit":"297","wizard":"358","incut":"1073","summary":"3410","keypoint":"4086","title":"82","scroll":"768","direct":"155","p3":"88","show":"487","p10":"95","feedback":"296","region":"287","help":"177","settings":"1137","recommendations":"2671","home":"1319","soo":"65","youtube":"624","google":"66","bing":"568"}},"clips":{"items":{"9200744489677434471":{"videoId":"9200744489677434471","docid":"33-7-9-ZC1883FD341A054AC","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/3275282/04aa6e73154e9d11cae5cad2125307c8/564x318_1"},"target":"_self","position":"0","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","isAdultDoc":false,"cwidth":640,"cheight":360,"cratio":1.77777,"dups":["9200744489677434471"]},"6575903821755483969":{"videoId":"6575903821755483969","docid":"33-3-3-Z7DBD2A07E66FEF8C","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/1626750/4224dfbe68bf4a55ddca981a8df5b5cb/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/Qqkb_gEAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"1","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","isAdultDoc":false,"cwidth":1920,"cheight":1080,"cratio":1.77777,"dups":["6575903821755483969"]},"9586382433096562773":{"videoId":"9586382433096562773","docid":"33-7-15-Z5CD100856C009538","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/4518546/d3cc139cc49e378679f0e2770a5bd8f1/564x318_1"},"target":"_self","position":"2","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","isAdultDoc":false,"cwidth":640,"cheight":360,"cratio":1.77777,"dups":["9586382433096562773"]},"12895167742326849596":{"videoId":"12895167742326849596","docid":"33-11-14-Z6701971295CF85AF","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/3174341/dae5956eec946a27ed94c62c9f616f1c/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/Ky3n9gEAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"4","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","isAdultDoc":false,"cwidth":1280,"cheight":720,"cratio":1.77777,"dups":["12895167742326849596"]},"6998406427771070590":{"videoId":"6998406427771070590","docid":"33-10-10-Z99D2E462EE8394B8","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/3645155/6e503f083d9870faa8f91eac8736ae7e/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/R01eBwIAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"5","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","isAdultDoc":false,"cwidth":1280,"cheight":720,"cratio":1.77777,"dups":["6998406427771070590"]},"572594079742785173":{"videoId":"572594079742785173","docid":"33-1-11-ZC654861B39D5130E","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/4222871/f24805fa66de2ed1b66fbd63e3f100c8/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/GpCj9AEAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"6","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","isAdultDoc":false,"cwidth":1280,"cheight":720,"cratio":1.77777,"dups":["572594079742785173"]},"2500345641454407945":{"videoId":"2500345641454407945","docid":"33-4-9-Z8CBFC34A4BBBB565","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/469690/b643fea5d03015c9df269a903a6af3fd/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/x8VL8wEAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"7","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","isAdultDoc":false,"cwidth":1280,"cheight":720,"cratio":1.77777,"dups":["2500345641454407945"]},"16619876699264623812":{"videoId":"16619876699264623812","docid":"33-8-12-Z75201429922FDE7B","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/998548/bbf9377dd49008713057ecfaa9799f34/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/rQ3s9QEAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"8","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","isAdultDoc":false,"cwidth":1280,"cheight":720,"cratio":1.77777,"dups":["16619876699264623812"]},"10062379656545679927":{"videoId":"10062379656545679927","docid":"33-11-9-Z4F971174ED181EA1","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/2883521/416a9a070e36a518459235e2fc6212ff/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/cHJD8gEAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"9","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","isAdultDoc":false,"cwidth":852,"cheight":480,"cratio":1.775,"dups":["10062379656545679927"]},"8420402231339563110":{"videoId":"8420402231339563110","docid":"33-5-12-Z12CCF154CA7A2142","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/1469132/a99e826345472822b6eb35849032fd7e/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/cHZD7wEAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"11","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","isAdultDoc":false,"cwidth":854,"cheight":480,"cratio":1.77916,"dups":["8420402231339563110"]},"9321585758009314139":{"videoId":"9321585758009314139","docid":"33-4-11-ZE7464156A3BB11EE","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/773887/91f363e5b61e70a7874c3f550059db27/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/WFS1-gEAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"12","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","isAdultDoc":false,"cwidth":854,"cheight":480,"cratio":1.77916,"dups":["9321585758009314139"]},"8588804762576193755":{"videoId":"8588804762576193755","docid":"33-11-5-Z61CC3F03652E7E20","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/2003801/3fa29b1056b38ee2d0b907d032087636/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/HQKc7QEAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"13","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","isAdultDoc":false,"cwidth":852,"cheight":480,"cratio":1.775,"dups":["8588804762576193755"]},"15194204044637110253":{"videoId":"15194204044637110253","docid":"33-2-17-ZCF7DC878A4252B91","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/3413282/4a4aae503ea711e50030d9e108d8cb97/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/nqab7QEAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"14","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","isAdultDoc":false,"cwidth":1280,"cheight":720,"cratio":1.77777,"dups":["15194204044637110253"]},"10705217378312548285":{"videoId":"10705217378312548285","docid":"33-7-7-ZF9F6CDBC806E8DEF","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/3284947/207ad21d35268fbeb3e41abaf1a9b6e2/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/rdA5-AEAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"15","reqid":"1725950441060256-3412303870553965797-balancer-l7leveler-kubr-yp-vla-21-BAL","isAdultDoc":false,"cwidth":1280,"cheight":720,"cratio":1.77777,"dups":["10705217378312548285"]}},"dups":{"9200744489677434471":{"videoId":"9200744489677434471","title":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 6: Psychology and Behavioural Economics","cleanTitle":"Security Engineering Lecture 6: Psychology and Behavioural Economics","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=9YIDBp1S5WI","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/9YIDBp1S5WI?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","origUrl":"http://www.youtube.com/@securityengineering1350","a11yText":"Security Engineering. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":3463,"text":"57:43","a11yText":"Длительность 57 минут 43 секунды"},"views":{"text":"1,3K","shouldShowInSnippet":true,"a11yText":"1,3 тысяч просмотров"},"date":"14 Nis 2022","modifyTime":1649951495000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"9200744489677434471","href":"/preview/9200744489677434471?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering"},"6575903821755483969":{"videoId":"6575903821755483969","title":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 16: Ian Levy, NCSC - Protecting a country for fun and profit","cleanTitle":"Security Engineering Lecture 16: Ian Levy, NCSC - Protecting a country for fun and profit","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=qv6SS5FhdUk","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/qv6SS5FhdUk?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","origUrl":"http://www.youtube.com/@securityengineering1350","a11yText":"Security Engineering. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":4439,"text":"1:13:59","a11yText":"Длительность 1 час 13 минут 59 секунд"},"views":{"text":"3K","shouldShowInSnippet":true,"a11yText":"3 тысячи просмотров"},"date":"7 Nis 2022","modifyTime":1649289600000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"6575903821755483969","href":"/preview/6575903821755483969?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering"},"9586382433096562773":{"videoId":"9586382433096562773","title":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 15: Governance and Regulation","cleanTitle":"Security Engineering Lecture 15: Governance and Regulation","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=PdMzMHizEaE","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/PdMzMHizEaE?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","origUrl":"https://www.youtube.com/channel/UCRw25HVj1Rvl2XcEHdj4PKg","a11yText":"Security Engineering. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":3566,"text":"59:26","a11yText":"Длительность 59 минут 26 секунд"},"views":{"text":"1,2K","shouldShowInSnippet":true,"a11yText":"1,2 тысяч просмотров"},"date":"6 Mar 2022","modifyTime":1646569807000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"9586382433096562773","href":"/preview/9586382433096562773?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering"},"12895167742326849596":{"videoId":"12895167742326849596","title":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 12: Ecosystems \u0007[Security\u0007]","cleanTitle":"Security Engineering Lecture 12: Ecosystems Security","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=-RH8MEoJunM","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/-RH8MEoJunM?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","origUrl":"http://www.youtube.com/@securityengineering1350","a11yText":"Security Engineering. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":3850,"text":"1:04:10","a11yText":"Длительность 1 час 4 минуты 10 секунд"},"views":{"text":"1,4K","shouldShowInSnippet":true,"a11yText":"1,4 тысяч просмотров"},"date":"27 Şub 2022","modifyTime":1645969655000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"12895167742326849596","href":"/preview/12895167742326849596?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering"},"6998406427771070590":{"videoId":"6998406427771070590","title":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 9: Hardware \u0007[Security\u0007] 2","cleanTitle":"Security Engineering Lecture 9: Hardware Security 2","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=RQzDqpi8154","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/RQzDqpi8154?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","origUrl":"http://www.youtube.com/@securityengineering1350","a11yText":"Security Engineering. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":2722,"text":"45:22","a11yText":"Длительность 45 минут 22 секунды"},"views":{"text":"1,7K","shouldShowInSnippet":true,"a11yText":"1,7 тысяч просмотров"},"date":"13 Şub 2022","modifyTime":1644710400000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"6998406427771070590","href":"/preview/6998406427771070590?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering"},"572594079742785173":{"videoId":"572594079742785173","title":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 10: Operating Systems 1","cleanTitle":"Security Engineering Lecture 10: Operating Systems 1","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=Hz_vomq8xAc","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/Hz_vomq8xAc?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","origUrl":"https://www.youtube.com/channel/UCRw25HVj1Rvl2XcEHdj4PKg","a11yText":"Security Engineering. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":3592,"text":"59:52","a11yText":"Длительность 59 минут 52 секунды"},"views":{"text":"2,4K","shouldShowInSnippet":true,"a11yText":"2,4 тысяч просмотров"},"date":"13 Şub 2022","modifyTime":1644710400000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"572594079742785173","href":"/preview/572594079742785173?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering"},"2500345641454407945":{"videoId":"2500345641454407945","title":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 8: Hardware \u0007[Security\u0007] 1","cleanTitle":"Security Engineering Lecture 8: Hardware Security 1","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=31z2G027Y5I","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/31z2G027Y5I?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","origUrl":"http://www.youtube.com/@securityengineering1350","a11yText":"Security Engineering. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":2991,"text":"49:51","a11yText":"Длительность 49 минут 51 секунда"},"views":{"text":"2,4K","shouldShowInSnippet":true,"a11yText":"2,4 тысяч просмотров"},"date":"6 Şub 2022","modifyTime":1644170445000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"2500345641454407945","href":"/preview/2500345641454407945?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering"},"16619876699264623812":{"videoId":"16619876699264623812","title":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 7: Network \u0007[Security\u0007]","cleanTitle":"Security Engineering Lecture 7: Network Security","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=ywKVVlEwk1w","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/ywKVVlEwk1w?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","origUrl":"https://www.youtube.com/channel/UCRw25HVj1Rvl2XcEHdj4PKg","a11yText":"Security Engineering. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":3007,"text":"50:07","a11yText":"Длительность 50 минут 7 секунд"},"views":{"text":"3,7K","shouldShowInSnippet":true,"a11yText":"3,7 тысяч просмотров"},"date":"6 Şub 2022","modifyTime":1644105600000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"16619876699264623812","href":"/preview/16619876699264623812?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering"},"10062379656545679927":{"videoId":"10062379656545679927","title":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 5: The Economics of \u0007[Security\u0007]","cleanTitle":"Security Engineering Lecture 5: The Economics of Security","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=9_8G8HmKH6Q","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/9_8G8HmKH6Q?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","origUrl":"https://www.youtube.com/channel/UCRw25HVj1Rvl2XcEHdj4PKg","a11yText":"Security Engineering. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":3315,"text":"55:15","a11yText":"Длительность 55 минут 15 секунд"},"views":{"text":"2K","shouldShowInSnippet":true,"a11yText":"2 тысячи просмотров"},"date":"30 Oca 2022","modifyTime":1643500800000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"10062379656545679927","href":"/preview/10062379656545679927?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering"},"8420402231339563110":{"videoId":"8420402231339563110","title":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 3: Banking \u0007[Security\u0007] 1","cleanTitle":"Security Engineering Lecture 3: Banking Security 1","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=qVXa3_MISzY","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/qVXa3_MISzY?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","origUrl":"https://www.youtube.com/channel/UCRw25HVj1Rvl2XcEHdj4PKg","a11yText":"Security Engineering. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":3760,"text":"1:02:40","a11yText":"Длительность 1 час 2 минуты 40 секунд"},"views":{"text":"5,1K","shouldShowInSnippet":true,"a11yText":"5,1 тысяч просмотров"},"date":"24 Oca 2022","modifyTime":1642981464000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"8420402231339563110","href":"/preview/8420402231339563110?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering"},"9321585758009314139":{"videoId":"9321585758009314139","title":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 4: Banking \u0007[Security\u0007] 2","cleanTitle":"Security Engineering Lecture 4: Banking Security 2","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=QwZ4FbbECqo","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/QwZ4FbbECqo?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","origUrl":"http://www.youtube.com/@securityengineering1350","a11yText":"Security Engineering. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":3103,"text":"51:43","a11yText":"Длительность 51 минутa 43 секунды"},"views":{"text":"2,8K","shouldShowInSnippet":true,"a11yText":"2,8 тысяч просмотров"},"date":"23 Oca 2022","modifyTime":1642896000000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"9321585758009314139","href":"/preview/9321585758009314139?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering"},"8588804762576193755":{"videoId":"8588804762576193755","title":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 2: Threat Models and \u0007[Security\u0007] Policies","cleanTitle":"Security Engineering Lecture 2: Threat Models and Security Policies","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=GDwbNs3J4ec","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/GDwbNs3J4ec?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","origUrl":"https://www.youtube.com/channel/UCRw25HVj1Rvl2XcEHdj4PKg","a11yText":"Security Engineering. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":3429,"text":"57:09","a11yText":"Длительность 57 минут 9 секунд"},"views":{"text":"8,4K","shouldShowInSnippet":true,"a11yText":"8,4 тысяч просмотров"},"date":"17 Oca 2022","modifyTime":1642377600000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"8588804762576193755","href":"/preview/8588804762576193755?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering"},"15194204044637110253":{"videoId":"15194204044637110253","title":"\u0007[Security\u0007] \u0007[Engineering\u0007] Lecture 1: Who is the Opponent? - Ross Anderson and Sam Ainsworth","cleanTitle":"Security Engineering Lecture 1: Who is the Opponent? - Ross Anderson and Sam Ainsworth","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=o1x_Oa0XiDI","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/o1x_Oa0XiDI?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","origUrl":"http://www.youtube.com/@securityengineering1350","a11yText":"Security Engineering. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":4083,"text":"1:08:03","a11yText":"Длительность 1 час 8 минут 3 секунды"},"views":{"text":"20,2K","shouldShowInSnippet":true,"a11yText":"20,2 тысяч просмотров"},"date":"16 Oca 2022","modifyTime":1642291200000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"15194204044637110253","href":"/preview/15194204044637110253?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering"},"10705217378312548285":{"videoId":"10705217378312548285","title":"\u0007[Security\u0007] \u0007[Engineering\u0007]: Trailer","cleanTitle":"Security Engineering: Trailer","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=2qNlv435L5g","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/2qNlv435L5g?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw==","name":"Security Engineering","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering","origUrl":"http://www.youtube.com/@securityengineering1350","a11yText":"Security Engineering. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":448,"text":"7:28","a11yText":"Длительность 7 минут 28 секунд"},"views":{"text":"4,4K","shouldShowInSnippet":true,"a11yText":"4,4 тысяч просмотров"},"date":"14 Oca 2022","modifyTime":1642118400000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"10705217378312548285","href":"/preview/10705217378312548285?channelId=d3d3LnlvdXR1YmUuY29tO1VDUncyNUhWajFSdmwyWGNFSGRqNFBLZw%3D%3D&how=tm&text=Security+Engineering"}}},"related":{"items":[],"loadingStatus":"None","nextPageNum":0,"ncrnd":0},"playbackQueue":{"currentIndex":0,"items":[]}}