-42%  NA WSZYSTKIE PRODUKTY !
Fototapeta Electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection, Generated AI
Fototapeta:
Electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection, Generated AI.
Autor:
Numer zdjęcia:
#371915317
Słowa kluczowe:
identyfikacja, uwierzytelniania, magazynowanie, ochrona, data, Szyfrowanie, ochrona danych, zakupy, sztuczny
Podobne
Catalog with documents, office supplies, personnel records, laptop or paper, Generated AI
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection
Catalog with documents, office supplies, personnel records, laptop or paper, Generated AI
Computer or paper, electronic and digital access, computer security system, cybersecurity, information security, encryption, secure Internet access, data protection, Generated AI
Catalog with documents, alphabetical index, office supplies, personnel records, business concept, Generated AI
Electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection, Generated AI
Electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection, Generated AI.
Catalog with documents, alphabetical index, office supplies, personnel records, business concept, Generated AI
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Microsearch, electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Microsearch, electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, Internet access, data protection
Microsearch, electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection
Microsearch, electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection
Microsearch, electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection
Microsearch, electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection
Microsearch, electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection
Microsearch, electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection
Microsearch, electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection
Microsearch, electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection
Microsearch, electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection
Microsearch, electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection
Microsearch, electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection
Microsearch, electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection
Microsearch, electronic and digital access, user authentication system, technology and cybernetics, computer security system, cybersecurity, information security, encryption, data protection
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection, Generative AI
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection, Generative AI
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection, Generative AI
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection, Generative AI
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection
A robot from a fantasy world on a city street
A robot from a fantasy world on a city street
A robot from a fantasy world on a city street
A robot from a fantasy world on a city street
A robot from a fantasy world on a city street
A robot from a fantasy world on a city street
A robot from a fantasy world on a city street
A robot from a fantasy world on a city street
A robot from a fantasy world on a city street
A robot from a fantasy world on a city street
A robot from a fantasy world on a city street
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection, Generated AI
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection, Generated AI
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection, Generated AI
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection, Generated AI
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection, Generated AI
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection, Generated AI
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection, Generated AI
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection, Generated AI
Robot, electronic and digital access, user authentication system, technology and cybernetics, cybersecurity, information security, encryption, data protection, Generated AI
zobacz więcejschowaj
Materiały

Fototapeta lateksowa

Powstaje z materiału lateksowego o gładkiej i matowej powierzchni dającej fotograficzny efekt. Wykorzystana technologia HP Latex zapewnia żywe i nieblaknące kolory odporne na promienie UV.
  • Maksymalna szerokość jednego brytu fototapety: 95 cm lub 105 cm w zależności od dostępności danego materiału. Żeby zapewnić podział taki, jakiego potrzebujesz, prosimy o zamieszczenie informacji o wybranej szerokości w komentarzu do zamówienia. Jeśli Twój wymiar będzie przekraczał maksymalną szerokość materiału, wydruk będzie się składał z kilku równych arkuszy.
  • Polecane zastosowanie: salon, sypialnia, przedpokój, pokój dziecięcy, sala konferencyjna.
  • Sposób klejenia: krawędź w krawędź
  • Czyszczenie: można przecierać suchą szmatką
  • Wykończenie: półmat

Fototapeta winylowa na flizelinie

Drukowana jest na matowym, wyjątkowo solidnym i odpornym materiale na podkładzie flizelinowym. Zapewnia to doskonałą trwałość i odporność na rozciąganie oraz odkształcenia. Materiał przepuszcza parę wodną, dzięki czemu ściany oddychają, a produkt nadaje się do kuchni i łazienki. Technologia HP Latex zapewnia żywe kolory na lata.
  • Maksymalna szerokość jednego brytu fototapety: 95 cm lub 105 cm w zależności od dostępności danego materiału. Żeby zapewnić podział taki, jakiego potrzebujesz, prosimy o zamieszczenie informacji o wybranej szerokości w komentarzu do zamówienia. W przypadku rozmiaru przekraczającego maksymalną szerokość materiału, wydruk będzie się składał z kilku równych arkuszy.
  • Polecane zastosowanie: salon, sypialnia, kuchnia, łazienka, przedpokój, pokój dziecięcy, hotel, restauracja, sala konferencyjna, budynki użytku publicznego, szkoły, przedszkola, żłobki.
  • Sposób klejenia: krawędź w krawędź. Nakładanie kleju tylko na ścianę znacznie ułatwia montaż.
  • Czyszczenie: można przecierać wilgotną szmatką
  • Wykończenie: półmat

Fototapeta winylowa na flizelinie struktura

Drukowana jest na wyjątkowo trwałym i odpornym podkładzie flizelinowym, którego grubość zmniejsza niewielkie nierówności na powierzchni ściany. Półmatowy materiał i struktura drobnego piasku na powierzchni dają ekskluzywny efekt. Fototapeta przepuszcza parę wodną, dzięki czemu ściany oddychają, a wzór nadaje się do kuchni i łazienki. Technologia HP Latex zapewnia żywe kolory na lata.
  • Maksymalna szerokość jednego brytu fototapety: 100 cm. Żeby zapewnić podział taki, jakiego potrzebujesz, prosimy o zamieszczenie informacji o wybranej szerokości w komentarzu do zamówienia. Gdy rozmiar przekracza maksymalną szerokość materiału, wydruk będzie się składał z kilku równych arkuszy.
  • Polecane zastosowanie: salon, sypialnia, kuchnia, łazienka, przedpokój, hotel, restauracja, sala konferencyjna, budynki użytku publicznego.
  • Sposób klejenia: krawędź w krawędź. Nakładanie kleju tylko na ścianę znacznie ułatwia montaż.
  • Czyszczenie: można przecierać wilgotną szmatką
  • Wykończenie: półmatowe, struktura drobnego piasku
  • Dodatkowe informacje: specjalna gramatura 255g/m2

Fototapeta samoprzylepna

To uniwersalny i praktyczny produkt, który sprawdzi się na większości gładkich powierzchni. Wzór można umieścić na ścianie, meblach i szklanych płaszczyznach. Specjalnie opracowany klej gwarantuje łatwe przyklejenie fototapety, dzięki czemu znacznie skracamy czas odmiany wnętrza. Technologia HP Latex zapewnia żywe kolory na lata.
  • Maksymalna szerokość jednego brytu fototapety: 133 cm. W przypadku rozmiaru przekraczającego maksymalną szerokość materiału, wydruk będzie się składał z kilku równych arkuszy.
  • Polecane zastosowanie: salon, sypialnia, kuchnia, przedpokój, pokój dziecięcy, hotel, restauracja, sala konferencyjna, budynki użytku publicznego, szkoły, przedszkola, żłobki.
  • Sposób klejenia: krawędź w krawędź, łatwe przyklejanie
  • Czyszczenie: można delikatnie przemywać wilgotną szmatką
  • Wykończenie: mat

Zobacz również
Natural Sunset Sunrise Over a Town. Bright Dramatic Sky And Dark Ground. Countryside Landscape Under Scenic Colorful Sky. Sun Over Skyline. Horizon. Warm Colours. Red Sunset
Natural Sunrise Sunrise Over a Town. Bright Dramatic Sky And Forest. Countryside Landscape Under Scenic Colorful Sky. Sun Over Skyline. Horizon. Warm Colours. Red Sunrise
Amazing realistic vintage toy with blue eyes.The doll dressed in a blue dress and has a blond hair. Selective focus. Porcelain.
Nougat with dried berries on a wooden board
Amazing realistic vintage toys with blue eyes.The dolls dressed in a blue dresses and have a blond hair. Selective focus. Porcelain.
Amazing realistic vintage toy with blue eyes.The doll dressed in a pink dress and has a blond hair. Selective focus. Porcelain.
Amazing realistic vintage toy with blue eyes.The doll dressed in a blue dress and has a blond hair. Selective focus. Porcelain.
Valentine's day with hearts and flowers, postcard, stock photo
Amazing realistic vintage toy with green eyes.The doll dressed in a gray-green dress with lace and flowers and has a blond hair. Selective focus. Porcelain doll.
Amazing realistic vintage toy with blue eyes. Doll dressed with lovely jeans jacket and trousers and has a ball. Selective focus. Porcelain doll.
Amazing realistic vintage 3 toys with blue and green eyes.The dolls dressed in a beautiful colored dresses. Selective focus. Porcelain dolls.
Amazing realistic vintage toy with blue eyes. Doll dressed with lovely blue dress. Selective focus. Porcelain.
Amazing realistic vintage toy with blue eyes. Doll dressed with lovely jeans jacket and trousers and has a ball. Selective focus. Porcelain doll.
Amazing realistic vintage toy with blue eyes.The doll dressed in a red-blue dress and has a red hair. Selective focus. Porcelain doll.
Amazing realistic vintage toy with blue eyes.The doll dressed in a white-blue dress with lace and has a blond hair. Selective focus. Porcelain doll.
Austrian and german donuts or krapfen.  Berliner with cream. On wooden background. Selective focus.
Amazing realistic vintage toy with blue eyes. Doll dressed with lovely blue dress. Selective focus. Porcelain.
Amazing realistic vintage toy with blue eyes.The doll dressed in a red-blue dress and has a red hair. Selective focus. Porcelain doll.
Amazing realistic vintage toy with blue eyes.The doll dressed in a white-blue dress with lace and has a blond hair. Selective focus. Porcelain doll.
Two small blue and red dumbbells on dark background
Austrian and german donuts or krapfen.  Berliner with cream. On wooden background. Selective focus.
Austrian and german donuts - krapfen.  Berliner with cream. On white table. Selective focus.
Amazing realistic vintage toy with blue eyes.The doll dressed in a pink dress and has a blond hair. Selective focus. Porcelain.
Amazing realistic two vintage toys: with blue and brown eyes.The dolls are dressed in colorful knitted dresses. Selective focus. Couple.
Amazing realistic vintage toy with green eyes.The doll dressed in a green dress with lace. Selective focus. Porcelain.
Amazing realistic vintage toy with blue eyes.The doll dressed in colorful knitted dress. Selective focus.
Austrian and german donuts or krapfen.  Berliner with cream. On wooden background. Selective focus.
Austrian and german donuts or krapfen. Berliner with cream. On wooden background. Selective focus.
Austrian and german donuts or krapfen.  Berliner with cream. On wooden background. Selective focus.
Austrian and german donuts or krapfen.  Berliner with cream. On wooden background. Selective focus.
Austrian and german donuts - krapfen.  Berliner with cream. On white table. Selective focus.
Jade roller massager, green, dual heads
Austrian and german donuts or krapfen.  Berliner with cream. On wooden background. Selective focus.
Copper object old Jug. Handcraft Decorative interior. Ancient Style. White background. Art. Stock photo. Selective focus.
Copper object old Jug with photo album. Handcraft Decorative interior. Ancient Style. White background. Art. Stock photo. Selective focus.
Austrian and german donuts or krapfen.  Faschingskrapfen. Berliner with cream. On wooden background. Selective focus.
Austrian and german donuts or krapfen.  Berliner with cream. On wooden background. Selective focus.
Amazing realistic vintage toy with blue eyes.The doll dressed in a gray-blue dress with lace and has a blond hair. Selective focus. Porcelain doll.
Amazing realistic vintage toy with blue eyes.The doll dressed in a white-blue dress with lace and has a red hair. Selective focus. Porcelain doll.
Amazing realistic vintage toys with green and blue eyes.The dolls dressed in a beautiful dresses and have a blond-red hair. Selective focus. Porcelain dolls.
Close up of a  fresh, healthy kiwi fruit stock photo
Austrian and german donuts - krapfen.  Berliner with cream. On white table. Selective focus.
Austrian and german donuts or krapfen. Faschingskrapfen. Berliner with cream. On wooden background. Selective focus.
Austrian and german donuts - krapfen.  Berliner with cream. On white table. Selective focus.
Austrian and german donuts - krapfen.  Berliner with cream. On white table. Selective focus.
Austrian and german donuts - krapfen.  Berliner with cream. On white table. Selective focus.
Austrian and german donuts or krapfen.  Faschingskrapfen. Berliner with cream. On wooden background. Selective focus.
Austrian and german donuts or krapfen.  Berliner with cream. On wooden background. Selective focus.
Austrian and german donuts or krapfen.  Berliner with cream. On wooden background. Selective focus.
Austrian and german donuts or krapfen.  Berliner with cream. On wooden background. Selective focus.
Austrian and german donuts - krapfen.  Berliner with cream. On white table. Selective focus.
Austrian and german donuts - krapfen.  Berliner with cream. On white table. Selective focus.
Austrian and german donuts - krapfen.  Berliner with cream. On white table. Selective focus.
A big round cupcake on dark background with yellow candle
A big round cupcake on dark background with yellow candle
A big round cupcake on dark background
zobacz więcejschowaj

Nasz sklep internetowy używa plików cookies i pokrewnych technologii. Dzięki nim zapewniamy najwyższą jakość świadczonych usług i gwarantujemy płynne działanie strony. Po uzyskaniu Twojej zgody, pliki cookies będą również wykorzystane do dodatkowych pomiarów i analizy korzystania z witryny. Pozwoli nam to dostosować stronę do Twoich zainteresowań oraz prezentować spersonalizowane treści i reklamy.
Administratorem Twoich danych jest Fairbox Sp. z o.o., a w niektórych sytuacjach także nasi partnerzy, z którymi współpracujemy. Szczegółowe informacje dotyczące korzystania z plików cookie oraz przetwarzania Twoich danych osobowych znajdziesz w naszej Polityce Prywatności i Cookies.
Ustawienia plików cookies
Poniżej znajdziesz opisy poszczególnych kategorii plików cookies oraz możliwość dostosowania ich do swoich preferencji:
Niezbędne
Używamy ich do zapewnienia poprawnego działania strony internetowej. Dzięki nim możesz bez zakłóceń poruszać się po naszym sklepie, a także bezpiecznie dokonywać zakupów.
Funkcjonalne
Służą do zapamiętywania wyborów dokonanych przez użytkowników na stronie, co pomaga dostosować witrynę do Twoich personalnych preferencji i poprawić komfort jej użytkowania.
Analityczne
Analityczne pliki cookies mierzą ilość wizyt i zbierają informacje o źródłach ruchu na stronie. Dzięki nim możemy zrozumieć sposób w jaki użytkownicy korzystają z witryny, doskonalić jakość usług oraz dostosowywać zawartość sklepu, aby lepiej spełniała oczekiwania naszych Klientów.
Marketingowe
Marketingowe pliki cookies umożliwiają nam i naszym partnerom dostosowanie treści reklamowych do Twoich zainteresowań. Służą także do wyświetlania reklam na innych stronach internetowych.