• Login
  • Sign Up
Member Area
  • Login
  • Sign Up
 English
    • Afrikaans formal
    • Afrikaans informal
    • Arabic
    • Azerbaijan
    • Brazilian
    • Bulgarian
    • Catalan
    • Chinese simplified
    • Chinese traditional
    • Croatian
    • Czech
    • Danish
    • Dutch
    • English
    • Estonian
    • Finnish
    • French
    • Georgian
    • German
    • Greek
    • Hebrew
    • Hungarian
    • Icelandic
    • Indonesian
    • Italian
    • Japanese
    • Latvian
    • Lithuanian
    • Malaysian
    • Norwegian
    • Persian
    • Polish
    • Portuguese
    • Romanian
    • Russian
    • Serbian
    • Slovakian
    • Slovenian
    • Spanish
    • Swedish
    • Thai
    • Turkish
    • Ukrainian
    • Vietnamese
VideotonStock
Your Shopping Cart is empty.
  • Files

    Stock

    • Photo
    • Video

    Special offer

    • Collections
    • Packages
    • Lightboxes

    Licenses

    • Royalty free
    • Rights managed
    • Creative
    • Editorial

    Items

    • Most downloaded
    • Featured
    • Most popular
    • New
    • Free
  • Categories

    Browse categories

  • Site info

    Site info

    • About
    • Support
    • Privacy Policy
    • Privacy Policy
    • FAQ
    • Contact Us
    • Contact Us
    • Terms and Conditions
    • Buyer Agreement
    • Seller Agreement

    Customers

    • Users
    • Credits

    Photographers

    • Boby Richards   0
    • Boby Richards   0
    • Videoton1   286
Search
Keywords:
Creator ID:
Type:
Categories:
Languages:
Orientation:
Color:
Model property release:
Duration Video:

Results (0)

 Auto paging
 Menu
A graphical representation of how data bias can distort AI training models, leading to incorrect predictions. 493
A graphical representation of how data bias can distort AI training models, leading to incorrect predictions. 493

A visual of deep learning applied to a neural network, with multiple layers processing complex data. 384
A visual of deep learning applied to a neural network, with multiple layers processing complex data. 384

A secure digital identity system, with a fingerprint scanner, facial recognition, and encryption layers protecting personal data. 93
A secure digital identity system, with a fingerprint scanner, facial recognition, and encryption layers protecting personal data. 93

A data breach represented as a digital flood, with information from multiple accounts pouring out from a compromised system. 374
A data breach represented as a digital flood, with information from multiple accounts pouring out from a compromised system. 374

A 3D diagram of a breached network, with unauthorized users accessing private data through compromised security systems. 347
A 3D diagram of a breached network, with unauthorized users accessing private data through compromised security systems. 347

A 3D diagram of a breached network, with unauthorized users accessing private data through compromised security systems. 348
A 3D diagram of a breached network, with unauthorized users accessing private data through compromised security systems. 348

A 3D diagram of a breached network, with unauthorized users accessing private data through compromised security systems. 345
A 3D diagram of a breached network, with unauthorized users accessing private data through compromised security systems. 345

A concept showing a breached company database, with sensitive customer information being leaked onto a hacker’s screen. 341
A concept showing a breached company database, with sensitive customer information being leaked onto a hacker’s screen. 341

A representation of a data breach targeting a bank, with bank account numbers and financial data being stolen in real-time. 327
A representation of a data breach targeting a bank, with bank account numbers and financial data being stolen in real-time. 327

A representation of a data breach targeting a bank, with bank account numbers and financial data being stolen in real-time. 326
A representation of a data breach targeting a bank, with bank account numbers and financial data being stolen in real-time. 326

A concept of an organization’s database being breached, with unauthorized access and stolen data visible on the screen. 314
A concept of an organization’s database being breached, with unauthorized access and stolen data visible on the screen. 314

A concept of an organization’s database being breached, with unauthorized access and stolen data visible on the screen. 315
A concept of an organization’s database being breached, with unauthorized access and stolen data visible on the screen. 315

A digital lock being shattered, with sensitive data spilling out into a cyber landscape, symbolizing a data breach. 311
A digital lock being shattered, with sensitive data spilling out into a cyber landscape, symbolizing a data breach. 311

A digital lock being shattered, with sensitive data spilling out into a cyber landscape, symbolizing a data breach. 309
A digital lock being shattered, with sensitive data spilling out into a cyber landscape, symbolizing a data breach. 309

A digital lock being shattered, with sensitive data spilling out into a cyber landscape, symbolizing a data breach. 310
A digital lock being shattered, with sensitive data spilling out into a cyber landscape, symbolizing a data breach. 310

A 3D illustration of a secure server being hacked, with streams of encrypted data flowing out during a breach. 307
A 3D illustration of a secure server being hacked, with streams of encrypted data flowing out during a breach. 307

A 3D illustration of a secure server being hacked, with streams of encrypted data flowing out during a breach. 308
A 3D illustration of a secure server being hacked, with streams of encrypted data flowing out during a breach. 308

A 3D illustration of a secure server being hacked, with streams of encrypted data flowing out during a breach. 305
A 3D illustration of a secure server being hacked, with streams of encrypted data flowing out during a breach. 305

A 3D illustration of a secure server being hacked, with streams of encrypted data flowing out during a breach. 306
A 3D illustration of a secure server being hacked, with streams of encrypted data flowing out during a breach. 306

A visual representation of a data breach, showing personal information and confidential files being leaked into the dark web. 301
A visual representation of a data breach, showing personal information and confidential files being leaked into the dark web. 301

A digital world map with markers showing penetration testing simulations performed in various locations by ethical hackers. 179
A digital world map with markers showing penetration testing simulations performed in various locations by ethical hackers. 179

An infographic-style image showing the impact of a data breach, with lost data, damaged reputations, and financial losses. 386
An infographic-style image showing the impact of a data breach, with lost data, damaged reputations, and financial losses. 386

A visual of a data pipeline with biased input at the beginning leading to unfair outcomes at the end. 472
A visual of a data pipeline with biased input at the beginning leading to unfair outcomes at the end. 472

A scale weighing biased and unbiased data, with one side heavily tilted due to biased input. 420
A scale weighing biased and unbiased data, with one side heavily tilted due to biased input. 420

A scale weighing biased and unbiased data, with one side heavily tilted due to biased input. 419
A scale weighing biased and unbiased data, with one side heavily tilted due to biased input. 419

A conceptual image of biased decision-making in AI, with a digital brain making unequal choices based on data. 405
A conceptual image of biased decision-making in AI, with a digital brain making unequal choices based on data. 405

A visual representation of algorithmic bias, showing unequal distribution of data leading to skewed outcomes. 404
A visual representation of algorithmic bias, showing unequal distribution of data leading to skewed outcomes. 404

A conceptual image of a machine learning algorithm applied to self-improvement, with iterative updates leading to better performance. 399
A conceptual image of a machine learning algorithm applied to self-improvement, with iterative updates leading to better performance. 399

A conceptual image of a machine learning algorithm applied to self-improvement, with iterative updates leading to better performance. 398
A conceptual image of a machine learning algorithm applied to self-improvement, with iterative updates leading to better performance. 398

A machine learning model using reinforcement learning to train an agent in a virtual environment. 392
A machine learning model using reinforcement learning to train an agent in a virtual environment. 392

An AI robot learning from a dataset, with visual representations of its neural network adjusting as it improves. 378
An AI robot learning from a dataset, with visual representations of its neural network adjusting as it improves. 378

A data scientist using machine learning tools to analyze complex datasets and make predictions. 364
A data scientist using machine learning tools to analyze complex datasets and make predictions. 364

A robot learning through machine learning by interacting with its environment and improving over time. 355
A robot learning through machine learning by interacting with its environment and improving over time. 355

A robot learning through machine learning by interacting with its environment and improving over time. 354
A robot learning through machine learning by interacting with its environment and improving over time. 354

A robot learning through machine learning by interacting with its environment and improving over time. 353
A robot learning through machine learning by interacting with its environment and improving over time. 353

A visual of a decision tree algorithm used in machine learning to make choices based on input data. 344
A visual of a decision tree algorithm used in machine learning to make choices based on input data. 344

A concept of unsupervised machine learning, with data points being grouped into clusters based on similarities. 339
A concept of unsupervised machine learning, with data points being grouped into clusters based on similarities. 339

A machine learning algorithm processing medical images, such as X-rays, to detect diseases or conditions. 333
A machine learning algorithm processing medical images, such as X-rays, to detect diseases or conditions. 333

A concept of machine learning applied to autonomous vehicles, with sensors and data streams used to navigate. 328
A concept of machine learning applied to autonomous vehicles, with sensors and data streams used to navigate. 328

A visual of a robot using machine learning to learn new tasks, with data being input into its neural network. 319
A visual of a robot using machine learning to learn new tasks, with data being input into its neural network. 319

A visual of a robot using machine learning to learn new tasks, with data being input into its neural network. 317
A visual of a robot using machine learning to learn new tasks, with data being input into its neural network. 317

A computer screen displaying a machine learning algorithm analyzing a dataset with charts and graphs showing progress. 312
A computer screen displaying a machine learning algorithm analyzing a dataset with charts and graphs showing progress. 312

A digital brain made of connected nodes and pathways, symbolizing machine learning algorithms and data processing. 302
A digital brain made of connected nodes and pathways, symbolizing machine learning algorithms and data processing. 302

An algorithm used for facial recognition, showing how the program processes facial features to identify individuals. 254
An algorithm used for facial recognition, showing how the program processes facial features to identify individuals. 254

A visual representation of symmetric encryption being used to protect a cloud-based file storage system, ensuring only authorized users have access. 499
A visual representation of symmetric encryption being used to protect a cloud-based file storage system, ensuring only authorized users have access. 499

A visual representation of symmetric encryption being used to protect a cloud-based file storage system, ensuring only authorized users have access. 497
A visual representation of symmetric encryption being used to protect a cloud-based file storage system, ensuring only authorized users have access. 497

A secure connection being established between two devices, with symmetric encryption ensuring that only authorized parties can decrypt the data. 496
A secure connection being established between two devices, with symmetric encryption ensuring that only authorized parties can decrypt the data. 496

A secure connection being established between two devices, with symmetric encryption ensuring that only authorized parties can decrypt the data. 494
A secure connection being established between two devices, with symmetric encryption ensuring that only authorized parties can decrypt the data. 494

A visual metaphor showing two people passing a secure encrypted message back and forth, with a shared key representing symmetric encryption. 492
A visual metaphor showing two people passing a secure encrypted message back and forth, with a shared key representing symmetric encryption. 492

A lock icon next to encrypted data, symbolizing the symmetric encryption method that ensures data security with a single shared key. 488
A lock icon next to encrypted data, symbolizing the symmetric encryption method that ensures data security with a single shared key. 488

A visual of a data packet being securely encrypted and sent across a network using symmetric encryption, ensuring confidentiality. 484
A visual of a data packet being securely encrypted and sent across a network using symmetric encryption, ensuring confidentiality. 484

A digital illustration of a symmetric encryption algorithm in action, where the encryption and decryption process are the same. 479
A digital illustration of a symmetric encryption algorithm in action, where the encryption and decryption process are the same. 479

A close-up of a communication network, where symmetric encryption ensures that both the sender and receiver use the same encryption key. 476
A close-up of a communication network, where symmetric encryption ensures that both the sender and receiver use the same encryption key. 476

A close-up of a communication network, where symmetric encryption ensures that both the sender and receiver use the same encryption key. 473
A close-up of a communication network, where symmetric encryption ensures that both the sender and receiver use the same encryption key. 473

An infographic demonstrating the speed and simplicity of symmetric encryption compared to asymmetric encryption, with clear visual representations. 472
An infographic demonstrating the speed and simplicity of symmetric encryption compared to asymmetric encryption, with clear visual representations. 472

A digital image showing how symmetric encryption ensures that the key used for encryption remains private and secure between parties. 460
A digital image showing how symmetric encryption ensures that the key used for encryption remains private and secure between parties. 460

An infographic demonstrating the speed and simplicity of symmetric encryption compared to asymmetric encryption, with clear visual representations. 471
An infographic demonstrating the speed and simplicity of symmetric encryption compared to asymmetric encryption, with clear visual representations. 471

A digital image showing how symmetric encryption ensures that the key used for encryption remains private and secure between parties. 459
A digital image showing how symmetric encryption ensures that the key used for encryption remains private and secure between parties. 459

A digital image showing how symmetric encryption ensures that the key used for encryption remains private and secure between parties. 458
A digital image showing how symmetric encryption ensures that the key used for encryption remains private and secure between parties. 458

A diagram illustrating symmetric encryption's use in encrypting and decrypting a message, where both parties share the same key. 448
A diagram illustrating symmetric encryption's use in encrypting and decrypting a message, where both parties share the same key. 448

A visual of a server securely processing encrypted requests with symmetric encryption keys, ensuring fast and secure data transmission. 451
A visual of a server securely processing encrypted requests with symmetric encryption keys, ensuring fast and secure data transmission. 451

A diagram illustrating symmetric encryption's use in encrypting and decrypting a message, where both parties share the same key. 447
A diagram illustrating symmetric encryption's use in encrypting and decrypting a message, where both parties share the same key. 447

A diagram illustrating symmetric encryption's use in encrypting and decrypting a message, where both parties share the same key. 445
A diagram illustrating symmetric encryption's use in encrypting and decrypting a message, where both parties share the same key. 445

An abstract representation of encrypted data flowing securely between two devices, with symmetric encryption key symbols at both ends. 438
An abstract representation of encrypted data flowing securely between two devices, with symmetric encryption key symbols at both ends. 438

An abstract representation of encrypted data flowing securely between two devices, with symmetric encryption key symbols at both ends. 439
An abstract representation of encrypted data flowing securely between two devices, with symmetric encryption key symbols at both ends. 439

A lock symbol representing symmetric encryption, with identical keys on both the sender and receiver sides of a digital communication. 432
A lock symbol representing symmetric encryption, with identical keys on both the sender and receiver sides of a digital communication. 432

A graphical representation of the symmetric encryption process, with a key used for both encrypting and decrypting data. 428
A graphical representation of the symmetric encryption process, with a key used for both encrypting and decrypting data. 428

A graphical representation of the symmetric encryption process, with a key used for both encrypting and decrypting data. 427
A graphical representation of the symmetric encryption process, with a key used for both encrypting and decrypting data. 427

A graphical representation of the symmetric encryption process, with a key used for both encrypting and decrypting data. 425
A graphical representation of the symmetric encryption process, with a key used for both encrypting and decrypting data. 425

A secure file transfer between two computers with symmetric encryption, visualized by a key symbol and encrypted data streams. 420
A secure file transfer between two computers with symmetric encryption, visualized by a key symbol and encrypted data streams. 420

A secure file transfer between two computers with symmetric encryption, visualized by a key symbol and encrypted data streams. 419
A secure file transfer between two computers with symmetric encryption, visualized by a key symbol and encrypted data streams. 419

A secure file transfer between two computers with symmetric encryption, visualized by a key symbol and encrypted data streams. 417
A secure file transfer between two computers with symmetric encryption, visualized by a key symbol and encrypted data streams. 417

A flowchart showing symmetric encryption in action, with the data being encrypted and decrypted using the same key on both ends. 409
A flowchart showing symmetric encryption in action, with the data being encrypted and decrypted using the same key on both ends. 409

A close-up of a digital lock and key symbolizing the symmetric encryption process, where the same key is used for both encryption and decryption. 405
A close-up of a digital lock and key symbolizing the symmetric encryption process, where the same key is used for both encryption and decryption. 405

A visual representation of two devices exchanging encrypted data using symmetric encryption with the same key for both encryption and decryption. 401
A visual representation of two devices exchanging encrypted data using symmetric encryption with the same key for both encryption and decryption. 401

A concept of an encrypted vault on a digital device, where files are securely stored and transmitted using end-to-end encryption. 398
A concept of an encrypted vault on a digital device, where files are securely stored and transmitted using end-to-end encryption. 398

An illustration showing a secure file transfer process where only the sender and receiver have access to the content via end-to-end encryption. 393
An illustration showing a secure file transfer process where only the sender and receiver have access to the content via end-to-end encryption. 393

A graphical image of two individuals communicating with end-to-end encryption, with messages appearing encrypted on the screen. 388
A graphical image of two individuals communicating with end-to-end encryption, with messages appearing encrypted on the screen. 388

A lock symbol with encrypted data in the form of binary code, representing end-to-end encryption in cybersecurity. 383
A lock symbol with encrypted data in the form of binary code, representing end-to-end encryption in cybersecurity. 383

A digital illustration of two encrypted messages being exchanged between devices with no third-party access. 365
A digital illustration of two encrypted messages being exchanged between devices with no third-party access. 365

A concept of a locked box representing end-to-end encryption, with only the intended recipient having the key to open it. 356
A concept of a locked box representing end-to-end encryption, with only the intended recipient having the key to open it. 356

A concept of a locked box representing end-to-end encryption, with only the intended recipient having the key to open it. 354
A concept of a locked box representing end-to-end encryption, with only the intended recipient having the key to open it. 354

An abstract image showing encrypted data moving across the internet with no one able to access it except the sender and receiver. 343
An abstract image showing encrypted data moving across the internet with no one able to access it except the sender and receiver. 343

An abstract image showing encrypted data moving across the internet with no one able to access it except the sender and receiver. 341
An abstract image showing encrypted data moving across the internet with no one able to access it except the sender and receiver. 341

A visual of two hands exchanging a secure, encrypted file with end-to-end encryption protection. 337
A visual of two hands exchanging a secure, encrypted file with end-to-end encryption protection. 337

A diagram illustrating the process of end-to-end encryption, showing encrypted data and private keys on each end. 326
A diagram illustrating the process of end-to-end encryption, showing encrypted data and private keys on each end. 326

A close-up of an email being encrypted, with a lock icon appearing as the message is sent securely. 318
A close-up of an email being encrypted, with a lock icon appearing as the message is sent securely. 318

A conceptual image of a secure tunnel formed by encryption, with data passing through without interception. 316
A conceptual image of a secure tunnel formed by encryption, with data passing through without interception. 316

A digital lock symbolizing end-to-end encryption, with encrypted data flowing securely between two devices. 304
A digital lock symbolizing end-to-end encryption, with encrypted data flowing securely between two devices. 304

A series of abstract shapes and elliptic curves symbolizing the mathematical principles behind ECC encryption. 297
A series of abstract shapes and elliptic curves symbolizing the mathematical principles behind ECC encryption. 297

A series of abstract shapes and elliptic curves symbolizing the mathematical principles behind ECC encryption. 300
A series of abstract shapes and elliptic curves symbolizing the mathematical principles behind ECC encryption. 300

A series of abstract shapes and elliptic curves symbolizing the mathematical principles behind ECC encryption. 298
A series of abstract shapes and elliptic curves symbolizing the mathematical principles behind ECC encryption. 298

A series of abstract shapes and elliptic curves symbolizing the mathematical principles behind ECC encryption. 299
A series of abstract shapes and elliptic curves symbolizing the mathematical principles behind ECC encryption. 299

A flow of encrypted data with elliptic curve cryptography keys, symbolizing protection against cyber threats. 291
A flow of encrypted data with elliptic curve cryptography keys, symbolizing protection against cyber threats. 291

A flow of encrypted data with elliptic curve cryptography keys, symbolizing protection against cyber threats. 292
A flow of encrypted data with elliptic curve cryptography keys, symbolizing protection against cyber threats. 292

A flow of encrypted data with elliptic curve cryptography keys, symbolizing protection against cyber threats. 290
A flow of encrypted data with elliptic curve cryptography keys, symbolizing protection against cyber threats. 290

A flow of encrypted data with elliptic curve cryptography keys, symbolizing protection against cyber threats. 289
A flow of encrypted data with elliptic curve cryptography keys, symbolizing protection against cyber threats. 289

A visual of data being transmitted through a secure ECC tunnel between two networks. 283
A visual of data being transmitted through a secure ECC tunnel between two networks. 283

A visual of data being transmitted through a secure ECC tunnel between two networks. 282
A visual of data being transmitted through a secure ECC tunnel between two networks. 282

A visual of data being transmitted through a secure ECC tunnel between two networks. 281
A visual of data being transmitted through a secure ECC tunnel between two networks. 281

  • Home
  • About
  • Support
  • Privacy Policy
  • News

Copyright © 2022 Videoton Media Stock