Ein Link zum Festlegen deines Kennworts wurde gesendet an: Um in Zukunft auf deine Käufe zugreifen zu können, benötigst du ein Kennwort.
Erstellen ohne Grenzen – unbegrenzte Downloads plus leistungsstarke KI-Bearbeitung.
Erstellen ohne Grenzen – unbegrenzte Downloads plus leistungsstarke KI-Bearbeitung.
Neue Filter hinzugefügt
Sortieren nach

51.979 Ergebnisse für protocol in „Videos“

 Neural Network Big Data Flow Visualization, Binary Code AIMatrix, AI Machine Learning Abstract Background, Quantum Computing, Cyber Security, Futuristic Technology Artificial IntelligenceC
00:08
Neural Network Big Data Flow Visualization, Binary Code Matrix, AI Machine Learning Abstract Background, Quantum Computing, Cyber Security, Futuristic Technology Artificial Intelligence Digital Grid
00:10
Crucial Fire Safety Sprinkler Systems for Emergency Maintenance and Service in Industry to Ensure Water Protection Against Hazards
00:05
IT specialist securing enterprise network data using firewall protection and cloud interface on laptop. Professional developer managing digital cybersecurity system and server configuration settings.
00:10
Prioritizing safety first in construction, manufacturing and safety protocols for a secure work environment. Motion graphics of safety first icon concept.
00:10
Man in scrubs wiping down sink to maintain hygiene in restroom setting
00:08
Launch complex evacuation protocol diagram, color-coded zones radiating from rocket pad center, emergency vehicle routes marked, safety coordinator reviewing procedure document, ideal for aerospace
00:10
Police officer interviews woman robbery victim after burglary about home report. Man in uniform listens, notes on notepad, and files the complaint for interview. Public safety, crime concept.
00:12
Professional handshake between a man and woman in a business meeting
00:10
Abrahams sacrifice of Isaac, an angel intervention preventing a father from offering his son, and ram substitution for symbolic redemption
00:08
Engineers in high visibility vests collaborate in control room, reviewing digital site plans and dashboards during an operations and safety discussion. Coordination, monitoring, and incident readiness
00:16
Hands holding a glowing blue shield with people symbols, securing digital data and private information. A concept for global network protection, trust, and future safety.
00:07
A bearded man in a turban marks the wooden door frame of a stone house with red blood using a bunch of hyssop herbs during the biblical Passover
00:08
Air traffic controller monitors flight paths at night in a busy airport control tower
00:10
Illustrating advanced crypto backed foreign exchange platforms leveraging blockchain protocols and digital asset security to facilitate efficient global currency conversion and international trade in
00:10
Noah's Sacrifice After the Flood - A man is offering a sacrifice, standing near a stone altar with a fire burning, with Noah's Ark in the background.
00:08
Neon text VPN, Virtual private network protocol concept. Glowing neon line animation of VPN icon on virtual screen for connect to VPN network
00:10
The concept of internet protocol network technology shows the future of computer science for business and information technology with the abstract cyber background
00:10
patient in intensive care receiving constant vital and medication checks, elderly individual connected to oxygen with medical staff monitoring closely for stability and recovery
00:05
Airplane cargo area being readied for shipment loading displaying packaging techniques and shipment protocols for secure international transport in  Photo Stock  Concept  and empty space on the left s
00:10
Security protocol violation alert warning. Cybersecurity defense and secure digital systems protection against cyberattacks. urgent threat notification concept with glowing red hazard icon.
00:10
Cyber security expert managing digital safeguard protocols inside a sophisticated dark workspace hub with immersive neon blue monitor glow and professional cinematic lighting effects during ni...
00:15
Worker in reflective jacket checks fuel delivery details at night, focusing on tanker truck and equipment, showcasing operational efficiency and safety measures
00:08
Closeup of procedural paperwork and stamps emphasizing the formal steps in parliamentary treaty approval processes.
00:06
Logistics, worker or hands with gloves in warehouse, increase grip or safety compliance for package transport. Shipping, bokeh or person with gear for chemical exposure, impact protection or protocol
00:11
A confidential document bears a prominent red classified stamp, adjacent to a large paper world map silhouetted on a table, hinting at interstate protocol and restricted clearance levels
00:06
A worker in a full protective suit carefully handles a container of uranium hexafluoride gas before enrichment, highlighting strict safety protocols and the controlled environment of nuclear processin
00:05
Two businessmen shake hands signifying a formal strategic partnership between the nations of China and Pakistan
00:10
Two women shaking hands in a professional office environment
00:10
 Cinematic video of Biblical patriarch Abraham looking at starry night sky receiving God's promise concept.
00:05
Advanced digital data protocol and network communication system visualization.
00:13
Global network map connection data flow technology cyberspace information datum glowing world technology network map glow cyberspace digital world information flow datum connect global communication
00:05
Ark of the covenant made of gold with two carved cherubim on the lid emitting a bright divine light revealing the stone tablets with commandments inside a sacred temple
00:08
Men witnesses the tearing of the temple veil. Biblical scene representing the end of the old covenant and the access to God. Ancient stone architecture setting.
00:05
Ark of the Covenant in a temple.
00:05
Cybersecurity Team Analyzing Data - A diverse team of cybersecurity professionals collaborates around computer monitors displaying encrypted data and security protocols, working together to identify
00:08
Construction Site Inspection with Female Engineer Taking Notes and Supervising Heavy Machinery Operations
00:08
Industrial safety interface with ppe icons and hazard warning
00:10
Jesus Christ and the apostles gather for the Last Supper in a dimly lit stone room, a key moment in Christian theology and Bible narrative.
00:08
Glowing digital shield hovers amid neon code streams symbolize cyber security and sturdy resilience
00:08
Quality control inspection in food processing facility safety protocols industrial environment close-up health standards compliance
00:14
Enhancing cloud computing security measures through advanced encryption protocols and robust cyber defense strategies to safeguard enterprise data integrity. in  Photo Stock  Concept  and empty space
00:10
Exploring the intricacies of copyright law in a legal setting during a busy day in a law office
00:15
Medical professionals in protective gear stand confidently against a backdrop of viruses, symbolizing resilience in the fight against infectious diseases and the importance of heal
00:10
Futuristic M Q T protocol network communication technology concept with global connections and digital data flow
00:10
Eternal covenant: Moses leads the Jews along the desert, showing religion depth, christian scripture, prophetic vision, divine law, sacred tradition, chosen heritage, holy endurance, ancient faith
00:08
Stacks of gold coins in front of colorful candlestick charts, symbolizing investment, trading, and financial growth.
00:08
Digital Quality Certificate and Checklist on Smartphone for Online Approval, Compliance Verification and Document Management System
00:11
Danger warning sign requiring hearing protection industrial facility with metal railing blurred machinery background conveying safety and urgent caution for workers about loud noise and compliance
00:05
Application programming interface technology concept. Person using laptop with API and cloud connection icons, data exchange, software development and system interoperability.
00:15
Glowing neon VPN Virtual Private network protocol concept. Motion graphics of VPN network idea.  personal networking concept.4k video animation
00:10
Man Doing Fire Extinguisher Safety Check
00:20
A conceptual representation of biblical obedience and divine protection showing Noah guiding pairs of animals into the wooden ark under a dramatic stormy sky signaling the coming flood
00:08
Eliezer Travels on a Camel to Find a Wife for Isaac, at the Order of His Master Abraham
00:10
firewall security hud  animation.High-tech dashboard interface displays a firewall breach alert, showing unauthorized access, digital threat indicators, and cybersecurity warning signals
00:10
Sealed evidence bags on stainless tabletop under blue light
00:05
A worker in protective gear thoroughly cleans and sanitizes industrial food processing machinery on a stainless steel table inside a sterile Environment. Foam covers the surface.
00:25
Emergency public health management scene, coordinated medical response with monitoring equipment and safety protocols, cinematic lighting, realistic healthcare setting, professional editorial
00:05
Hand disinfection technique in clinical care setting following hygiene protocol for infection prevention practice
00:54
Indian army soldier proudly holding the national flag on a sunny day
00:08
process engineers review reactor mixing and dashboard telemetry at industrial plant - touchscreen controls and stainless vessels - safety protocols and real time data visualization
00:07
Essential Water Sprinklers for Emergency Safety in Industry Prioritizing Maintenance and Service for Effective Fire Protection
00:05
International multicultural experts featuring senior male executive and young female analyst managing digital safeguard protocols and network security in a sophisticated dark workspace hub.
00:15
A professional security operator observes live footage from numerous surveillance cameras in a high tech control center. The environment highlights cutting edge monitoring and safety protocols
00:10
System for safeguarding digital identity using fingerprint authentication, encryption, and secure access protocols across cloud, device, and personal data environments Marrow
00:10
flags of israel and lebanon on the negotiation table next to a folder and a pen concept of signing a peace treaty and official settlement of disputes with diplomatic mission
00:06
Biblical Mephibosheth Walking Restored in Gentle Light Silhouette, David's Kindness and Covenant Mercy, 4K Ancient History
00:05
Secure Connection: VPN gateway interface in remote network with floating shield and lock icons
00:08
Prophet Moses and the Burning Bush concept. God Speaking on Mount Horeb. Book of Exodus Cinematic Bible Scene
00:10
Cybersecurity Team Analyzing Encrypted Data - A diverse team of cybersecurity professionals works collaboratively, analyzing encrypted data on multiple computer screens displaying security protocols
00:08
Jesus teaching outdoor with his hands open while people listen attentively around him. Biblical event with man speaking to crowd.
00:06
The hand of a patient with an IV undergoing surgery is seen from under a blue drape.
00:08
Angry elderly prophet moses with gray beard holding stone tablets shouting at a golden calf statue in the desert at sunset with a large crowd and mountains in the background
00:08
Network connection and communication technology concept with interconnected nodes.
00:10
A bustling police communication center showcasing officers immersed in technology and teamwork as they monitor radio frequencies and respond to calls for service
00:08
Enhancing cloud computing security measures through advanced encryption protocols and robust cyber defense strategies to safeguard enterprise data integrity. in  Photo Stock  Concept  and empty space
00:10
A worker in a full protective suit carefully handles a container of uranium hexafluoride gas before enrichment, highlighting strict safety protocols and the controlled environment of nuclear processin
00:05
Abstract digital network visualization with H T P protocol data flow and global connectivity symbols
00:10
Nurse preparing disposal bag for ostomy pouch change following hygiene protocol and safe waste management practice
00:19
Glowing blue network nodes connected by luminous lines dark surface forming digital circuit pattern conveying connectivity and data flow modern technology concept. digital network grid of glowing
00:08
Ark of the Covenant in a temple.
00:05
Intense hacker in a hoodie types on a laptop beside glowing code screens and stacked servers today!!
00:08
Abel, a shepherd, and Cain, a farmer, bringing their offerings to god with a burning altar and sheep grazing, bible story footage.
00:08
A biblical prophet like Noah praying at a sacrificial altar with a large fire. An elderly man worships under a rainbow symbolizing God's covenant. Old Testament story of faith and promise
00:05
Neural Network Big Data Flow Visualization, Binary Code Matrix, AI Machine Learning Abstract Background, Quantum Computing, Cyber Security, Futuristic Technology Artificial Intelligence Digital Grid
00:10
Ensuring safety in the workplace with protective gear and awareness
00:16
Woman in police uniform working indoors at a station while wearing a headset, showcasing a professional office environment.
00:13
Golden Menorah illuminated by a divine light beam standing among ancient temple ruins at sunset for religious history concept and spiritual heritage
00:11
AI Safety and Ethics Concept on the black background. Ethical guidelines and safety protocols in artificial intelligence systems. Motion graphics of  security warning signs, and checkmarks. 4k video.
00:15
Food safety protocols are strictly enforced at the food factory, including sanitation checks, temperature control, and contamination prevention. cinematic color correction, natural uneven lighting
00:10
Restaurant kitchen staff diligently sanitizing stainless steel counter with spray and cloth, concept for hygiene protocols, food safety compliance and professional cleaning services
00:05
Medium shot of an engineer configuring secure network protocols on advanced routers to enhance system security
00:06
A conceptual representation of the biblical story of Jacob's Ladder, showing a man sleeping on the rocky ground of a desert wilderness under a starry night sky with a swirling divine portal opening ab
00:08
Moses leading the Israelites through the desert during Exodus biblical prophet guiding people across wilderness landscapes, spiritual leadership faith journey ancient history, Old Testament narrative
00:10
EU flags wave under a blue sky beside the curved glass facade of the Lex Building in Brussels’ European Quarter.
00:15
God’s Promise to Abraham — Descendants as Numerous as the Stars | Cinematic Biblical AI-Generated Scene
00:10
Advanced cybersecurity and data protection framework with business analytics gears and secure network connection concept for corporate digital infrastructure.
00:14
Data analysis with high-speed transfer connectivity, future background
00:16
Digital Rain Abstract: A visual portrayal of digital rain, with data streams cascading downwards. Lines of code represent the flow of information in a digital world.
00:10
Security guard, safety and microphone with man in control room for surveillance management, evacuation protocol and monitor system. Inspection, technology and computer screen with person in office
00:07