Похожие видео
array(10) {
[0]=>
object(stdClass)#6864 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "MHhHrztQ-Cw"
["related_video_title"]=>
string(38) "What makes a secure SDLC? | AppSec 101"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(17) "Fortify Unplugged"
}
[1]=>
object(stdClass)#6837 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "cU4dKMo13dk"
["related_video_title"]=>
string(28) "Secure Coding Best Practices"
["posted_time"]=>
string(19) "8 лет назад"
["channelName"]=>
string(59) "Software Engineering Institute | Carnegie Mellon University"
}
[2]=>
object(stdClass)#6862 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "KiEptGbnEBc"
["related_video_title"]=>
string(39) "How to Pass Your SY0-701 Security+ Exam"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(16) "Professor Messer"
}
[3]=>
object(stdClass)#6869 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "4Cr0OxXU7jY"
["related_video_title"]=>
string(81) "What is SDLC | Importance Of SDLC | Software Development Life Cycle | Intellipaat"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(11) "Intellipaat"
}
[4]=>
object(stdClass)#6848 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "aircAruvnKk"
["related_video_title"]=>
string(101) "Но что такое нейронная сеть? | Глава 1. Глубокое обучение"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
string(11) "3Blue1Brown"
}
[5]=>
object(stdClass)#6866 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "AF8LSurfct4"
["related_video_title"]=>
string(68) "Programming ▫️ Coding ▫️ Hacking ▫️ Designing Music 🦠"
["posted_time"]=>
string(28) "10 месяцев назад"
["channelName"]=>
string(6) "FilFar"
}
[6]=>
object(stdClass)#6861 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "r_MbozD32eo"
["related_video_title"]=>
string(46) "Multithreading in Java Explained in 10 Minutes"
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
string(16) "Coding with John"
}
[7]=>
object(stdClass)#6871 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "EJzitviiv2c"
["related_video_title"]=>
string(29) "КАК УСТРОЕН TCP/IP?"
["posted_time"]=>
string(28) "10 месяцев назад"
["channelName"]=>
string(7) "Alek OS"
}
[8]=>
object(stdClass)#6847 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "sjyJBL5fkp8"
["related_video_title"]=>
string(64) "var, let and const - What, why and how - ES6 JavaScript Features"
["posted_time"]=>
string(19) "8 лет назад"
["channelName"]=>
string(16) "Fun Fun Function"
}
[9]=>
object(stdClass)#6865 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "eGm2NRK-EiI"
["related_video_title"]=>
string(99) "Using OWASP SAMM to kickstart the SSDLC - Lessons learned from real-world projects, by Thomas Kerbl"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(10) "OWASP SAMM"
}
}
What makes a secure SDLC? | AppSec 101
Secure Coding Best Practices
How to Pass Your SY0-701 Security+ Exam
What is SDLC | Importance Of SDLC | Software Development Life Cycle | Intellipaat
Но что такое нейронная сеть? | Глава 1. Глубокое обучение
Programming ▫️ Coding ▫️ Hacking ▫️ Designing Music 🦠
Multithreading in Java Explained in 10 Minutes
КАК УСТРОЕН TCP/IP?
var, let and const - What, why and how - ES6 JavaScript Features
Using OWASP SAMM to kickstart the SSDLC - Lessons learned from real-world projects, by Thomas Kerbl