73 Vektoren zum Thema "Kommunikationsprotokolle" bei ClipDealer

Medien sortieren nach     Gehe zu Seite:    
« Vorherige  1  2  
Open padlock with keyhole, circular arrows indicating data exchange. Ideal for security, data protection, privacy, encryption, online safety, communication protocols access control. Landing page
white text illustration for ip address concept - is a numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication
Netiquette word cloud concept with white background
voip voice over internet protocol concept with big words and team people and icon with modern isometric isometry 3d style - vector
NFC and Mobile payment flat isolated concept. Near Field Communication vector Icon.
voip voice over internet protocol concept with big words and team people and icon for website template design landing homepage - vector
Pos terminal confirms payment from smartphone. Mobile Payment and NFC technology concept. Flat style vector illustration.
Pos terminal confirms payment from smartphone. Mobile Payment and NFC technology concept. Flat style vector illustration.
Mobile Payment and NFC technology concept. Pos terminal confirms payment from smartphone. Flat style vector illustration.
Single connection to mail server multi colored flat icons on plain square backgrounds. Included white and darker icon variations for hover or active effects.
Mail server icons in round glossy buttons with steel frames
Engineering workflow line icons signs set. Design collection of Engineering, workflow, design, process, optimisation, automation, planning, development outline vector concept illustrations
Exclamation mark triangle, circular arrow, hand showing stop sign. Ideal for safety, caution, hazard warnings, alerts, user instructions protocols process control. Line metaphor
Shoe beside two upward arrows and an exclamation mark inside a triangular warning sign. Ideal for safety protocols, cautionary signs, awareness campaigns, workplace safety, hazard warnings
Quantum cryptography focuses on secure communication, encryption, and data protection. Outline icons set
Computer screen with emails, binary code, and an eye symbol, clipboard with a checklist, cloud. Ideal for data security, cloud storage, productivity tools, compliance organization privacy abstract
Person pointing at a lock, emphasizing security. Arrows indicate data flow directions, highlighting control. Ideal for data privacy, encryption, digital security, access control, information
A simple illustration of a cloud with "5G" written on it, accomp
A simple line drawing of a radiation symbol, often used to indic
Quantum cryptography focuses on secure communication using quantum mechanics. Key elements include atoms, locks, and binary code. Dark theme outline style illustration.
Gears in a network linked to user icons and a lock for security. Ideal for cybersecurity, data protection, team collaboration, machine processes, IT systems, secure operations, abstract line flat
Abstract digital signature above electronic document with security lock and check mark. Ideal for online security, authentication, digital contracts, secure communication, e-signatures, data
Human figure pointing beside running icon and medical cross. Ideal for emergency actions, healthcare, safety guidelines, medical services, urgent responses, first aid, crisis management. Reflects
Account security web banner showcasing user login elements, a camera for monitoring, and security icons. It conveys a focus on cybersecurity
Padlock shield symbolizing security, woman sitting with laptop, authentication checklist with verification marks. Ideal for cybersecurity, data protection, privacy, authentication processes, online
A server is a system or device that provides services, resources, or data to other computers over a network. It manages and controls networked devices and applications.
Computer network architecture icons depict design, data transmission, and protection. Outline icons set
Person holding a tablet and pointing at a leaf near symbolic letters R, , and SK. Ideal for business analysis, decision-making, risk management, safety protocols, education, awareness campaigns
A network is a system of interconnected devices that communicate and share resources. It enables data transfer, collaboration, and remote access, supporting various applications in business, education, and personal use.
Cybersecurity involves protecting systems, networks, and data from digital threats like hacking, malware, and unauthorized access, ensuring confidentiality, integrity, and availability of information across platforms and devices.
Cloud with globe symbol, arrows pointing left, and verification icon indicating data exchange and security. Ideal for cloud services, data transfer, global connectivity, security protocols, IT
Data security focuses on protection and encryption. Key objects, padlock, shield, key. Dark theme outline style illustration.
Quantum cryptography focuses on secure communication using quantum mechanics, featuring a lock, key, and binary code. Dark theme outline style illustration.
Female cybersecurity professional using laptop with security authentication elements like passwords, fingerprint scans, and shields. Represents secure login, digital security, and protection
Cybersecurity black line icon.
Milk carton, cheese, fish, egg, wheat, secure lock, person pointing. Ideal for health nutrition food security diet awareness safety protocols food preservation education. Abstract line flat
A simple illustration of a microchip with "5G" prominently displ
Application security focuses on protecting data with a central lock, gears, and email symbol. Dark theme outline style illustration.
Icon with large triangular alert symbol beside circular arrows indicating repetition and woman pointing, emphasizing warnings, instructions, and cautionary steps. Ideal for educational materials
Networking is the process of connecting and exchanging data between devices, systems, or organizations to share resources, communicate efficiently, and enable collaboration in personal, professional, or technological environments.
Networking involves connecting computers and devices to share data, resources, and services. It enables communication across systems, facilitates internet access, and supports businesses, security, and online collaboration.
WiFi is a wireless networking technology that allows devices to connect to the internet or local networks without physical cables, using radio waves to transmit data over short to medium distances.
Cybersecurity in cloud-based media management. Protecting data files and documents in digital folders during data transfers. Vector illustration of cloud storage icon.
Data security focuses on protecting digital information with key elements like a lock, cloud, and laptop. Dark theme outline style illustration.
Endpoint security focuses on protecting devices from threats. Key objects, lock, laptop, shield. Dark theme outline style illustration.
Lock icon below globe with upward arrow illustrating secure data transmission and online safety. Ideal for cybersecurity, online protection, data privacy, secure connections, internet safety
Blue flame, black shoes in motion, downward arrow emphasize risk, safety, emergency, evacuation, hazard prevention. Ideal for fire safety, workplace security emergency protocols hazard signs risk
Client certificate mapping, icon in line design. Client certificate mapping, SSL certificate, certificate-based security on white background vector. Client certificate mapping editable stroke icon
Information security analyst icons outline key concepts like surveillance, access control, and data protection. Outline icons set
Security refers to the protection of individuals, organizations, and assets from threats, risks, or harm, ensuring safety, confidentiality, integrity, and availability through preventive measures, monitoring, and risk management strategies.

« Vorherige  1  2