Login
Sign Up
Member Area
Login
Sign Up
English
Afrikaans formal
Afrikaans informal
Arabic
Azerbaijan
Brazilian
Bulgarian
Catalan
Chinese simplified
Chinese traditional
Croatian
Czech
Danish
Dutch
English
Estonian
Finnish
French
Georgian
German
Greek
Hebrew
Hungarian
Icelandic
Indonesian
Italian
Japanese
Latvian
Lithuanian
Malaysian
Norwegian
Persian
Polish
Portuguese
Romanian
Russian
Serbian
Slovakian
Slovenian
Spanish
Swedish
Thai
Turkish
Ukrainian
Vietnamese
Toggle navigation
VideotonStock
Your Shopping Cart is empty.
Files
Stock
Photo
Video
Special offer
Collections
Packages
Lightboxes
Licenses
Royalty free
Rights managed
Creative
Editorial
Items
Most downloaded
Featured
Most popular
New
Free
Categories
Browse categories
Site info
Site info
About
Support
Privacy Policy
Privacy Policy
FAQ
Contact Us
Contact Us
Terms and Conditions
Buyer Agreement
Seller Agreement
Customers
Users
Credits
Photographers
Boby Richards
0
Boby Richards
0
Videoton1
286
Search
Keywords:
Creator ID:
Type:
Photo
Illustration
Vector
Video
Template
3d
Categories:
Animals
Buildings and Architecture
Business
Drinks
The Environment
States of Mind
Food
Graphic Resources
Hobbies and Leisure
Industry
Landscapes
Lifestyle
People
Plants and Flowers
Culture and Religion
Science
Social Issues
Sports
Technology
Transport
Travel
News
Entertainment
Sport News
Languages:
Brazilan Portuguese - Brazil
English - Canada
French - Canada
Spanish - Mexico
English - United States
English - Belgium
French - Belgium
Dutch - Belgium
Czech - Czech Republic
English - Cyprus
Danish - Danmark
German - Germany
English - Estonia
Spanish - Spain
French - France
French - Marocco
English - Greece
English - Ireland
Italian - Italia
English - Latvia
English - Lithuania
German - Luxembourg
English - Luxembourg
French - Luxembourg
English - Hungary
English - Malta
Dutch - Nederlands
Bokmal Norwegian - Norway
German - Austria
Polish - Poland
Portuguese - Portugal
English - Romania
German - Switzerland
English - Slovenia
Slovakian - Slovakia
French - Switzerland
English - Finland
Swedish- Sweden
Italian - Switzerland
English - United Kingdom
English - Bulgaria
English - Australia
Japanese - Japan
Korean - South Korea
English - New Zealand
Russian - Russia
English - Ukrain
English - Thailand
Orientation:
All
Horizontal
Vertical
square
Color:
Model property release:
All
Yes
No
Duration Video:
All
Up to 10 seconds
Up to 20 seconds
Longer than 30 seconds
Results
(0)
Site
Getty/iStock
Bigstockphoto
Pixabay
Adobe Stock
Relevance
New
Most popular
Most downloaded
Undiscovered
12
24
36
48
96
Auto paging
Menu
A graphical representation of how data bias can distort AI training models, leading to incorrect predictions. 493
A visual of deep learning applied to a neural network, with multiple layers processing complex data. 384
A secure digital identity system, with a fingerprint scanner, facial recognition, and encryption layers protecting personal data. 93
A data breach represented as a digital flood, with information from multiple accounts pouring out from a compromised system. 374
A 3D diagram of a breached network, with unauthorized users accessing private data through compromised security systems. 347
A 3D diagram of a breached network, with unauthorized users accessing private data through compromised security systems. 348
A 3D diagram of a breached network, with unauthorized users accessing private data through compromised security systems. 345
A concept showing a breached company database, with sensitive customer information being leaked onto a hacker’s screen. 341
A representation of a data breach targeting a bank, with bank account numbers and financial data being stolen in real-time. 327
A representation of a data breach targeting a bank, with bank account numbers and financial data being stolen in real-time. 326
A concept of an organization’s database being breached, with unauthorized access and stolen data visible on the screen. 314
A concept of an organization’s database being breached, with unauthorized access and stolen data visible on the screen. 315
A digital lock being shattered, with sensitive data spilling out into a cyber landscape, symbolizing a data breach. 311
A digital lock being shattered, with sensitive data spilling out into a cyber landscape, symbolizing a data breach. 309
A digital lock being shattered, with sensitive data spilling out into a cyber landscape, symbolizing a data breach. 310
A 3D illustration of a secure server being hacked, with streams of encrypted data flowing out during a breach. 307
A 3D illustration of a secure server being hacked, with streams of encrypted data flowing out during a breach. 308
A 3D illustration of a secure server being hacked, with streams of encrypted data flowing out during a breach. 305
A 3D illustration of a secure server being hacked, with streams of encrypted data flowing out during a breach. 306
A visual representation of a data breach, showing personal information and confidential files being leaked into the dark web. 301
A digital world map with markers showing penetration testing simulations performed in various locations by ethical hackers. 179
An infographic-style image showing the impact of a data breach, with lost data, damaged reputations, and financial losses. 386
A visual of a data pipeline with biased input at the beginning leading to unfair outcomes at the end. 472
A scale weighing biased and unbiased data, with one side heavily tilted due to biased input. 420
A scale weighing biased and unbiased data, with one side heavily tilted due to biased input. 419
A conceptual image of biased decision-making in AI, with a digital brain making unequal choices based on data. 405
A visual representation of algorithmic bias, showing unequal distribution of data leading to skewed outcomes. 404
A conceptual image of a machine learning algorithm applied to self-improvement, with iterative updates leading to better performance. 399
A conceptual image of a machine learning algorithm applied to self-improvement, with iterative updates leading to better performance. 398
A machine learning model using reinforcement learning to train an agent in a virtual environment. 392
An AI robot learning from a dataset, with visual representations of its neural network adjusting as it improves. 378
A data scientist using machine learning tools to analyze complex datasets and make predictions. 364
A robot learning through machine learning by interacting with its environment and improving over time. 355
A robot learning through machine learning by interacting with its environment and improving over time. 354
A robot learning through machine learning by interacting with its environment and improving over time. 353
A visual of a decision tree algorithm used in machine learning to make choices based on input data. 344
A concept of unsupervised machine learning, with data points being grouped into clusters based on similarities. 339
A machine learning algorithm processing medical images, such as X-rays, to detect diseases or conditions. 333
A concept of machine learning applied to autonomous vehicles, with sensors and data streams used to navigate. 328
A visual of a robot using machine learning to learn new tasks, with data being input into its neural network. 319
A visual of a robot using machine learning to learn new tasks, with data being input into its neural network. 317
A computer screen displaying a machine learning algorithm analyzing a dataset with charts and graphs showing progress. 312
A digital brain made of connected nodes and pathways, symbolizing machine learning algorithms and data processing. 302
An algorithm used for facial recognition, showing how the program processes facial features to identify individuals. 254
A visual representation of symmetric encryption being used to protect a cloud-based file storage system, ensuring only authorized users have access. 499
A visual representation of symmetric encryption being used to protect a cloud-based file storage system, ensuring only authorized users have access. 497
A secure connection being established between two devices, with symmetric encryption ensuring that only authorized parties can decrypt the data. 496
A secure connection being established between two devices, with symmetric encryption ensuring that only authorized parties can decrypt the data. 494
A visual metaphor showing two people passing a secure encrypted message back and forth, with a shared key representing symmetric encryption. 492
A lock icon next to encrypted data, symbolizing the symmetric encryption method that ensures data security with a single shared key. 488
A visual of a data packet being securely encrypted and sent across a network using symmetric encryption, ensuring confidentiality. 484
A digital illustration of a symmetric encryption algorithm in action, where the encryption and decryption process are the same. 479
A close-up of a communication network, where symmetric encryption ensures that both the sender and receiver use the same encryption key. 476
A close-up of a communication network, where symmetric encryption ensures that both the sender and receiver use the same encryption key. 473
An infographic demonstrating the speed and simplicity of symmetric encryption compared to asymmetric encryption, with clear visual representations. 472
A digital image showing how symmetric encryption ensures that the key used for encryption remains private and secure between parties. 460
An infographic demonstrating the speed and simplicity of symmetric encryption compared to asymmetric encryption, with clear visual representations. 471
A digital image showing how symmetric encryption ensures that the key used for encryption remains private and secure between parties. 459
A digital image showing how symmetric encryption ensures that the key used for encryption remains private and secure between parties. 458
A diagram illustrating symmetric encryption's use in encrypting and decrypting a message, where both parties share the same key. 448
A visual of a server securely processing encrypted requests with symmetric encryption keys, ensuring fast and secure data transmission. 451
A diagram illustrating symmetric encryption's use in encrypting and decrypting a message, where both parties share the same key. 447
A diagram illustrating symmetric encryption's use in encrypting and decrypting a message, where both parties share the same key. 445
An abstract representation of encrypted data flowing securely between two devices, with symmetric encryption key symbols at both ends. 438
An abstract representation of encrypted data flowing securely between two devices, with symmetric encryption key symbols at both ends. 439
A lock symbol representing symmetric encryption, with identical keys on both the sender and receiver sides of a digital communication. 432
A graphical representation of the symmetric encryption process, with a key used for both encrypting and decrypting data. 428
A graphical representation of the symmetric encryption process, with a key used for both encrypting and decrypting data. 427
A graphical representation of the symmetric encryption process, with a key used for both encrypting and decrypting data. 425
A secure file transfer between two computers with symmetric encryption, visualized by a key symbol and encrypted data streams. 420
A secure file transfer between two computers with symmetric encryption, visualized by a key symbol and encrypted data streams. 419
A secure file transfer between two computers with symmetric encryption, visualized by a key symbol and encrypted data streams. 417
A flowchart showing symmetric encryption in action, with the data being encrypted and decrypted using the same key on both ends. 409
A close-up of a digital lock and key symbolizing the symmetric encryption process, where the same key is used for both encryption and decryption. 405
A visual representation of two devices exchanging encrypted data using symmetric encryption with the same key for both encryption and decryption. 401
A concept of an encrypted vault on a digital device, where files are securely stored and transmitted using end-to-end encryption. 398
An illustration showing a secure file transfer process where only the sender and receiver have access to the content via end-to-end encryption. 393
A graphical image of two individuals communicating with end-to-end encryption, with messages appearing encrypted on the screen. 388
A lock symbol with encrypted data in the form of binary code, representing end-to-end encryption in cybersecurity. 383
A digital illustration of two encrypted messages being exchanged between devices with no third-party access. 365
A concept of a locked box representing end-to-end encryption, with only the intended recipient having the key to open it. 356
A concept of a locked box representing end-to-end encryption, with only the intended recipient having the key to open it. 354
An abstract image showing encrypted data moving across the internet with no one able to access it except the sender and receiver. 343
An abstract image showing encrypted data moving across the internet with no one able to access it except the sender and receiver. 341
A visual of two hands exchanging a secure, encrypted file with end-to-end encryption protection. 337
A diagram illustrating the process of end-to-end encryption, showing encrypted data and private keys on each end. 326
A close-up of an email being encrypted, with a lock icon appearing as the message is sent securely. 318
A conceptual image of a secure tunnel formed by encryption, with data passing through without interception. 316
A digital lock symbolizing end-to-end encryption, with encrypted data flowing securely between two devices. 304
A series of abstract shapes and elliptic curves symbolizing the mathematical principles behind ECC encryption. 297
A series of abstract shapes and elliptic curves symbolizing the mathematical principles behind ECC encryption. 300
A series of abstract shapes and elliptic curves symbolizing the mathematical principles behind ECC encryption. 298
A series of abstract shapes and elliptic curves symbolizing the mathematical principles behind ECC encryption. 299
A flow of encrypted data with elliptic curve cryptography keys, symbolizing protection against cyber threats. 291
A flow of encrypted data with elliptic curve cryptography keys, symbolizing protection against cyber threats. 292
A flow of encrypted data with elliptic curve cryptography keys, symbolizing protection against cyber threats. 290
A flow of encrypted data with elliptic curve cryptography keys, symbolizing protection against cyber threats. 289
A visual of data being transmitted through a secure ECC tunnel between two networks. 283
A visual of data being transmitted through a secure ECC tunnel between two networks. 282
A visual of data being transmitted through a secure ECC tunnel between two networks. 281