암호 설정을 위한 링크가 다음으로 전송됨: 나중에 구매 기능을 이용하려면 암호가 필요합니다.
무제한 다운로드와 강력한 AI 편집 기능으로 제약 없이 창작해 보세요
무제한 다운로드와 강력한 AI 편집 기능으로 제약 없이 창작해 보세요
새 필터 추가됨
정렬 기준

비디오에서 protocols에 관한 52,407개 결과

Two engineers wearing respirators and helmets are closely examining blueprints in a dusty industrial factory, ensuring workplace safety protocols and efficient project inspection.
00:08
Cybersecurity expert analyzing encrypted data streams on a laptop for potential breach detection.
00:05
VoIP voice over internet protocol concept. Person using laptop with internet calling and communication icons, digital phone system, online communication and cloud telephony.
00:15
Neural Network Big Data Flow Visualization, Binary Code Matrix, AI Machine Learning Abstract Background, Quantum Computing, Cyber Security, Futuristic Technology Artificial Intelligence Digital Grid
00:10
Closeup of network server equipment
00:08
Moses leading the Israelites through the desert during Exodus biblical prophet guiding people across wilderness landscapes, spiritual leadership faith journey ancient history, Old Testament narrative
00:10
System for safeguarding digital identity using fingerprint authentication, encryption, and secure access protocols across cloud, device, and personal data environments Marrow
00:10
A conceptual representation of biblical obedience and divine protection showing Noah guiding pairs of animals into the wooden ark under a dramatic stormy sky signaling the coming flood
00:08
Global network connection icon with folders and a central node representing data transfer
00:06
Essential Water Sprinklers for Emergency Safety in Industry Prioritizing Maintenance and Service for Effective Fire Protection
00:05
In sterile, industrial environment, person wearing protective clothing and gloves carefully wipes down stainless steel shelves with white cloth. Scene illustrates meticulous cleaning hygiene protocols
00:43
Digital Quality Certificate and Checklist on Smartphone for Online Approval, Compliance Verification and Document Management System
00:11
Logistics professional, clad in safety vest hard hat, scrutinizes shipping documents near parked trucks at vibrant transportation hub, ensuring warehouse operations meet stringent industry standards
00:05
process engineers review reactor mixing and dashboard telemetry at industrial plant - touchscreen controls and stainless vessels - safety protocols and real time data visualization
00:07
Healthcare Worker Washing Hands in Modern Kitchen.
00:08
Office workspace with cybersecurity network overlay. Digital shield icons and wireless connectivity symbols represent data protection, it security infrastructure and enterprise defense system
00:09
Edgecomputingnetworks cloud network data connection internet nodes security latency optimization distributed processing scalability performance analytics cloud computing digital infrastructure
00:05
Golden Menorah illuminated by a divine light beam standing among ancient temple ruins at sunset for religious history concept and spiritual heritage
00:11
Secure data transfer protocol and network communication standards concept with high-tech HUD interface and connectivity symbols.
00:12
Quality control inspection in food processing facility safety protocols industrial environment close-up health standards compliance
00:14
Glowing file icons float in network. Digital data nodes link through connection. Cloud storage and server cluster visualize transfer. Security and blockchain concept represented by glowing paths.
00:07
Tech specialists reviewing data security protocols during private cloud migration focusing on enhanced control and compliance with corporate policies.
00:06
Digital access granted interface showing successful user authentication and secure entry protocols perfect for biometric security ads and corporate identity verification
00:20
patient in intensive care receiving constant vital and medication checks, elderly individual connected to oxygen with medical staff monitoring closely for stability and recovery
00:05
firewall security hud  animation.High-tech dashboard interface displays a firewall breach alert, showing unauthorized access, digital threat indicators, and cybersecurity warning signals
00:10
Network connection and communication technology concept with interconnected nodes.
00:10
System for safeguarding digital identity using fingerprint authentication, encryption, and secure access protocols across cloud, device, and personal data environments Marrow
00:10
Ark of the covenant made of gold with two carved cherubim on the lid emitting a bright divine light revealing the stone tablets with commandments inside a sacred temple
00:08
Digital Global Network Interface with IP Icon and World Map Background internet protocol
00:12
Biblical Mephibosheth Walking Restored in Gentle Light Silhouette, David's Kindness and Covenant Mercy, 4K Ancient History
00:05
Sodom and Gomorrah dramatic destruction panicked people fleeing biblical story concept
00:08
IT specialist securing enterprise network data using firewall protection and cloud interface on laptop. Professional developer managing digital cybersecurity system and server configuration settings.
00:10
Tabernacle Altar Of Burnt Offering In Wilderness
00:10
Logistics, worker or hands with gloves in warehouse, increase grip or safety compliance for package transport. Shipping, bokeh or person with gear for chemical exposure, impact protection or protocol
00:11
Neon network illustration showing centralized database node connected to multiple data services and gears futuristic digital interface conveying cloud integration and secure data flow glowing gear
00:08
Network Protocol animated word cloud-text design animation tag kinetic typography seamless loop.
00:18
A worker in a full protective suit carefully handles a container of uranium hexafluoride gas before enrichment, highlighting strict safety protocols and the controlled environment of nuclear processin
00:05
Cybersecurity Team Analyzing Encrypted Data - A diverse team of cybersecurity professionals works collaboratively, analyzing encrypted data on multiple computer screens displaying security protocols
00:08
Digital checklists for business certification and quality assurance. Streamline verification processes with performance audits and system control for improved efficiency and standards compliance.
00:12
Futuristic circular interface displaying I Pv6 in the center on a dark blurred background IPv6 internet protocol
00:10
handshake between diplomats with French and German flags in the background
00:05
Industrial worker applying ecofriendly organic sorbents to neutralize chemical spill emphasizing safe handling and environmental protection during hazardous cleanup.
00:05
Enterprise cyber security dashboard featuring Prevention analytics interface with secure threat monitoring and digital protection technology.4k Animation.
00:10
Neon text VPN, Virtual private network protocol concept. Glowing neon line animation of VPN icon on virtual screen for connect to VPN network
00:10
Multi-factor authentication and identity management protocol for secure user access and global network credential verification
00:15
Close-up of a businessman in a blue suit giving a thumbs up behind a glowing circular digital interface with a checkmark and compliance icons, minimal interface pulses, static framing with slow cinema
00:05
System for safeguarding digital identity using fingerprint authentication, encryption, and secure access protocols across cloud, device, and personal data environments Marrow
00:10
Jesus Christ breaking bread and sharing wine with twelve apostles at candlelit Last Supper representing sacred eucharist covenant and crucifixion. Holy week in biblical semana santa
00:15
Abraham looked up at the starry sky at night, remembering and believing in God's promise. Bible story scene in the old testament
00:10
A confidential document bears a prominent red classified stamp, adjacent to a large paper world map silhouetted on a table, hinting at interstate protocol and restricted clearance levels
00:06
Medical professionals in protective gear stand confidently against a backdrop of viruses, symbolizing resilience in the fight against infectious diseases and the importance of heal
00:10
Cinematic scene of the Prophet Moses (Moshe) wearing a hooded robe, carrying the stone Tablets (Luchot) of the Covenant down a rugged, dusty mountain.
00:08
Ark of the Covenant in a temple.
00:05
Security protocol violation alert warning. Cybersecurity defense and secure digital systems protection against cyberattacks. urgent threat notification concept with glowing red hazard icon.
00:10
Construction Site Inspection with Female Engineer Taking Notes and Supervising Heavy Machinery Operations
00:08
Steganography animated word cloud-text design animation tag kinetic typography seamless loop.
00:18
Futuristic cyber network protocol system with robot icon for secure digital communication and cloud data protection, hud animation
00:15
The concept of internet protocol network technology shows the future of computer science for business and information technology with the abstract cyber background
00:10
Worker in reflective jacket checks fuel delivery details at night, focusing on tanker truck and equipment, showcasing operational efficiency and safety measures
00:08
Teal HUD Circle with HTPS Text and Blurred Bokeh Background HTTPS hypertext transfer protocol secure
00:10
Trainer Doing Flashlight Gear Demo
00:40
Medium shot of a technician implementing advanced encryption protocols on customer data in a busy call center environment.
00:05
Tablet, doctors and hospital manager in meeting, discussion or update ideas for medical protocol. Healthcare, policy change and people brainstorming for care optimization, tech or address complaint
00:05
Hands holding a glowing blue shield with people symbols, securing digital data and private information. A concept for global network protection, trust, and future safety.
00:07
Advanced data encryption and cryptographic security protocols for secure information transmission and private network communications
00:15
Technology team analyzing a digital tablet during a strategic workshop focused on AGI safety protocols and neural network deployment.
00:29
System for safeguarding digital identity using fingerprint authentication, encryption, and secure access protocols across cloud, device, and personal data environments Marrow
00:10
A bearded man in a turban marks the wooden door frame of a stone house with red blood using a bunch of hyssop herbs during the biblical Passover
00:08
Engineers in protective gear inspect industrial equipment. safety and teamwork in highrisk environments.
00:08
God’s Promise to Abraham — Descendants as Numerous as the Stars | Cinematic Biblical AI-Generated Scene.
00:10
two scientists in lab coats studying realtime data graphs on a monitor beside server racks - pointing at spikes and discussing anomaly detection and experiment results focused research
00:06
Close-up of hands holding a smartphone displaying a red extreme tornado emergency alert. High-stakes visual for disaster preparedness, weather safety, and emergency apps. Realistic 4K footage for news
00:16
A worker in a full protective suit carefully handles a container of uranium hexafluoride gas before enrichment, highlighting strict safety protocols and the controlled environment of nuclear processin
00:05
Cybersecurity Team Analyzing Data - A diverse team of cybersecurity professionals collaborates around computer monitors displaying encrypted data and security protocols, working together to identify
00:08
Security protocol restricted access warning screen
00:15
Deep packet inspection wiretap terminal capturing network metadata IP addresses and communication protocols for cybersecurity
00:15
Advanced active shield interface displaying automated network security defense protocols and cyber firewall protection, hud animation
00:15
Prioritizing safety first in construction, manufacturing and safety protocols for a secure work environment. Motion graphics of safety first icon concept.
00:10
High-contrast monochrome display featuring fingerprints linked by investigation lines and case notes. Ideal for mystery trailers, noir spy thrillers, and criminal justice.
00:15
Digital HUD Circle with HTP Text and Teal Bokeh Background HTTP hypertext transfer protocol
00:10
Engineers in high visibility vests collaborate in control room, reviewing digital site plans and dashboards during an operations and safety discussion. Coordination, monitoring, and incident readiness
00:16
Danger warning sign requiring hearing protection industrial facility with metal railing blurred machinery background conveying safety and urgent caution for workers about loud noise and compliance
00:05
Medium shot of an engineer configuring secure network protocols on advanced routers to enhance system security
00:06
Stacks of gold coins in front of colorful candlestick charts, symbolizing investment, trading, and financial growth.
00:08
Glowing neon VPN Virtual Private network protocol concept. Motion graphics of VPN network idea.  personal networking concept.4k video animation
00:10
Futuristic cyber resilience dashboard featuring intelligent network protection analytics, digital security recovery monitoring, and enterprise defense continuity visualization
00:10
Fire engine trucks and ambulance vehicles responding to fire alarm at night. Investigation of carbon monoxide gas hazard at private house in USA.
00:16
Ancient Jewish man marking doorpost with hyssop and lamb blood during Passover night in biblical Exodus scene representing divine protection obedience and deliverance from death
00:08
Silhouette of two military soldiers shaking hands stands against grim background of burning, ruined city at dusk. Symbol of accord amidst widespread chaos and total devastation. Armistice ceasefire
00:05
 Cinematic video of Biblical patriarch Abraham looking at starry night sky receiving God's promise concept.
00:05
sterile technicians inspect handheld medical devices in cleanroom setting, masked and gloved operators arrange devices on stainless tray, quality checks, packaging materials and aseptic
00:05
Abrahams sacrifice of Isaac, an angel intervention preventing a father from offering his son, and ram substitution for symbolic redemption
00:08
HTTP WWW COM text with binary code on digital screen
00:08
 Neural Network Big Data Flow Visualization, Binary Code AIMatrix, AI Machine Learning Abstract Background, Quantum Computing, Cyber Security, Futuristic Technology Artificial IntelligenceC
00:08
Rear view of factory workers gathered around supervisor giving safety instructions, bright overhead industrial lights illuminating metal equipment and workshop environment
00:10
Neural Network Big Data Flow Visualization, Binary Code Matrix, AI Machine Learning Abstract Background, Quantum Computing, Cyber Security, Futuristic Technology Artificial Intelligence Digital Grid
00:10
Software engineering concept for developer training showing digital code structures and advanced application design protocols
00:15
Security guard, surveillance and microphone with man in control room for safety management, evacuation protocol and monitor system. Inspection, technology and computer screen with person in office
00:06
Fire Extinguisher And Carbon Dioxide Information Signs Mounted On Wall For Safety And Emergency Preparedness In Commercial Building.
00:11
The agents coordinate surveillance activities and maintain security protocols in a modern operations center. The army base staff interpret real time data to ensure national security. Video
00:10