A Fotolia será encerrada em %s. Associe-se ao Adobe Stock hoje - Saiba maisOcultar ofertaVeja mais
Logo do Adobe Stock
Experimente o Adobe Stock agora mesmo e receba 10 imagens gratuitas.
Tenha o melhor da Fotolia e muito mais.
Comece agora
  • Lightbox (0)

      Para organizar e salvar as suas seleções em pastas, deve primeiro registar-se ou entrar na sua conta.
      O registo é grátis!

      Registar Log in

  • Carrinho (0)
  • Entrar
  • Registar
Fotolia Logotipo da Adobe
  • Imagens
    • Fotos
    • Ilustrações
    • Vetores
    • Vídeos
    • Por Coleção:
    • Core Collection
    • Infinite Collection
    • Instant Collection
  • Vídeos
  • Ofertas
    • Comprar créditos
    • Comprar um pacote mensal
Tudo

(210 700) resultados

255075100
Miniatura
Filtro adulto
OnOff
Pré-Visualização
OnOff
Ferramentas de pesquisa
1 2 3 4 5 de 5
Tipo de ficheiro
  • tudo
  •  foto(~ 68 500)
  •  ilustração(~ 58 200)
  •  vetor(~ 77 700)
  •  vídeo(~ 6 100)
Orientação
  • Orientação:todas
  •  Orientação:horizontal(~ 125 000)
  •  Orientação:vertical(~ 9 200)
  •  Quadrado(~ 75 900)
Tamanho
  •  L(~ 204 000)
  •  XL(~ 198 000)
  •  XXL(~ 150 000)
  •  X(~ 210 000)
Coleção
  • Todas as coleções
  •  Core collection
  •  Infinite collection
  •  Coleção de Baixo Custo
  •  Instant collection
  •  Disponível por assinatura
Preço
Preço XS máximo:
Não filtrar
 
 
 
Recentes
  • Tudo
  •  ≤ 2a(~ 118 000)
  •  ≤ 1a(~ 65 600)
  •  ≤ 6m(~ 32 800)
  •  ≤ 1m(~ 5 000)
  •  ≤ 1s(~ 760)
Pessoas
  • Tudo
  •  Com pessoas
  •  Sem pessoas
opções
  •  Isolado(~ 75 000)
  •  Pânoramico(~ 2 100)
Cor
Categoria
  • Tecnologia(~ 80 200)
  • Recursos Gráficos(~ 73 700)
  • Estilo de Vida(~ 19 100)
  • Negócios(~ 18 100)
  • Pessoas(~ 4 500)
  • Hobbies e Lazer(~ 3 800)
  • Problemas Sociais(~ 3 100)
  • Construções e Arquitetura(~ 2 100)
  • Indústria(~ 1 600)
  • Ciência(~ 1 000)
  • Transportes(~ 330)
  • Viagens(~ 290)
  • Religião e Cultura(~ 250)
  • Sentimentos, Emoções e Estados mentais(~ 230)
  • Meio Ambiente(~ 180)
  • Esportes(~ 160)
  • Paisagens(~ 150)
  • Animais(~ 130)
  • Comida(~ 60)
  • Bebidas(~ 40)
  • Plantas e Flores(~ 20)
Conteúdos similares: 227233284
Businessman watching thin line web security interface

Businessman watching thin line web security interface

sdecoret
2018-10-11Fotolia
Businessman watching GDPR law interface

Businessman watching GDPR law interface

sdecoret
2018-08-28Fotolia
Businessman watching thin line web security interface

Businessman watching thin line web security interface

sdecoret
2018-10-03Fotolia
Businessman watching thin line web security interface

Businessman watching thin line web security interface

sdecoret
2018-10-18Fotolia
Businessman watching thin line web security interface

Businessman watching thin line web security interface

sdecoret
2018-11-04Fotolia
Businessman watching GDPR law interface

Businessman watching GDPR law interface

sdecoret
2018-09-15Fotolia
Businessman watching thin line web security interface

Businessman watching thin line web security interface

sdecoret
2018-08-27Fotolia
Businessman watching thin line web security interface

Businessman watching thin line web security interface

sdecoret
2018-10-10Fotolia
Businessman watching social network sketch on a rooftop 3D rendering

Businessman watching social network sketch on a rooftop 3D rendering

sdecoret
2017-10-17Fotolia
Businessman watching social network sketch on a rooftop 3D rendering

Businessman watching social network sketch on a rooftop 3D rendering

sdecoret
2017-10-22Fotolia
Businessman watching antivirus interface on a rooftop 3D rendering

Businessman watching antivirus interface on a rooftop 3D rendering

sdecoret
2017-10-03Fotolia
Businessman watching internet security interface sketch on a rooftop 3D rendering

Businessman watching internet security interface sketch on a rooftop 3D rendering

sdecoret
2017-11-26Fotolia
Businessman watching social network connections on a rooftop 3D rendering

Businessman watching social network connections on a rooftop 3D rendering

sdecoret
2018-03-04Fotolia
Businessman watching internet security interface sketch on a rooftop 3D rendering

Businessman watching internet security interface sketch on a rooftop 3D rendering

sdecoret
2017-09-16Fotolia
Binary code on laptop screen with finger clicking mouse pad trying to retrieve folder by paying ransom to hacker. Security technology concept.

Binary code on laptop screen with finger clicking mouse pad trying to retrieve folder by paying ransom to hacker. Security technology concept.

Aminah
2017-05-18Fotolia
Businessman watching antivirus interface on a rooftop 3D rendering

Businessman watching antivirus interface on a rooftop 3D rendering

sdecoret
2018-03-03Fotolia
businessman hand shows the earth as construction concept

businessman hand shows the earth as construction concept

everythingpossible
2018-06-10Fotolia
Businessman watching internet security interface sketch on a rooftop 3D rendering

Businessman watching internet security interface sketch on a rooftop 3D rendering

sdecoret
2017-08-26Fotolia
Computer virus skull concept. 
Illustration of Abstract Skull sign with binary codes on blue background. Concept for online piracy, hacking.

Computer virus skull concept. Illustration of Abstract Skull sign with binary codes on blue background. Concept for online piracy, hacking.

jiris
2018-08-03Fotolia
abstract key and binary code

abstract key and binary code

Spartak
2012-07-24Fotolia
Hacker using laptop. Hacking the Internet

Hacker using laptop. Hacking the Internet

BillionPhotos.com
2018-08-03Fotolia
digital safety concept electronic key isolated on white

digital safety concept electronic key isolated on white

the_lightwriter
2016-03-15Fotolia
Businessman watching internet security interface sketch on a rooftop 3D rendering

Businessman watching internet security interface sketch on a rooftop 3D rendering

sdecoret
2017-07-02Fotolia
male hacker sitting at a table and smoking

male hacker sitting at a table and smoking

nelen.ru
2018-02-07Fotolia
cyber security internet and networking concept.Businessman hand working with VR screen padlock icon on computer background

cyber security internet and networking concept.Businessman hand working with VR screen padlock icon on computer background

everythingpossible
2017-08-07Fotolia
Security.

Security.

BillionPhotos.com
2017-12-29Fotolia
Businessman hand shows the system block chain .

Businessman hand shows the system block chain .

natali_mis
2018-02-28Fotolia
Data Security Encryption.

Data Security Encryption.

andranik123
2017-07-01Fotolia
cyber security internet and networking concept.Businessman hand working with VR screen padlock icon on computer background

cyber security internet and networking concept.Businessman hand working with VR screen padlock icon on computer background

everythingpossible
2017-07-05Fotolia
cyber security internet and networking concept.Businessman hand working with VR screen padlock icon on computer background

cyber security internet and networking concept.Businessman hand working with VR screen padlock icon on computer background

everythingpossible
2017-08-07Fotolia
Padlock on CPU computer circuit board. Lock over  the motherboard. Network security concept.

Padlock on CPU computer circuit board. Lock over the motherboard. Network security concept.

Maksym Yemelyanov
2018-04-14Fotolia
Robot open his hand with empty space and binary data number background, Artificial intelligence in futuristic digital technology concept. 3d illustration

Robot open his hand with empty space and binary data number background, Artificial intelligence in futuristic digital technology concept. 3d illustration

tam
2018-10-03Fotolia
Padlock on CPU computer circuit board. Lock over  the motherboard. Network security concept.

Padlock on CPU computer circuit board. Lock over the motherboard. Network security concept.

Maksym Yemelyanov
2018-04-07Fotolia
Masked man hacking server in dark room

Masked man hacking server in dark room

Africa Studio
2018-01-18Fotolia
Hacker accessing to personal data information with a computer 3D rendering

Hacker accessing to personal data information with a computer 3D rendering

sdecoret
2017-10-01Fotolia
Hacker using clear tablet with HUD panel and code graph bar data analytsis element for cyber technology concept

Hacker using clear tablet with HUD panel and code graph bar data analytsis element for cyber technology concept

Kaikoro
2017-07-04Fotolia
security

security

Sean Gladwell
2006-08-22Fotolia
Magnifier glass showing a cracked open chip with gears cybersecurity concept

Magnifier glass showing a cracked open chip with gears cybersecurity concept

beebright
2018-01-11Fotolia
Hacker stealing password and identity, computer crime

Hacker stealing password and identity, computer crime

Boonchai
2018-01-08Fotolia
Network connection security system technology. Globe and network connection and lock with applications icon. Element of this image are published by NASA

Network connection security system technology. Globe and network connection and lock with applications icon. Element of this image are published by NASA

sasinparaksa
2018-05-01Fotolia
An experienced hacker is hacking through a laptop

An experienced hacker is hacking through a laptop

nelen.ru
2018-01-10Fotolia
White robot on blurred background hacking and accessing private cyber datas

White robot on blurred background hacking and accessing private cyber datas

sdecoret
2018-10-11Fotolia
Computer hacker or Cyber attack concept background

Computer hacker or Cyber attack concept background

chainat
2017-01-10Fotolia
mysterious bearded man in a hood doing something illegal on a laptop

mysterious bearded man in a hood doing something illegal on a laptop

nelen.ru
2018-01-05Fotolia
Businessman watching internet security interface sketch on a rooftop 3D rendering

Businessman watching internet security interface sketch on a rooftop 3D rendering

sdecoret
2017-12-09Fotolia
White robot hacking and accessing GDPR interface

White robot hacking and accessing GDPR interface

sdecoret
2018-10-08Fotolia
cyber security internet and networking concept.Businessman hand working with VR screen padlock icon on mobile phone and laptop computer background

cyber security internet and networking concept.Businessman hand working with VR screen padlock icon on mobile phone and laptop computer background

everythingpossible
2017-08-07Fotolia
Businessman watching antivirus interface on a rooftop 3D rendering

Businessman watching antivirus interface on a rooftop 3D rendering

sdecoret
2017-08-07Fotolia
mysterious bearded man hacking does something illegal on a laptop, in the dark

mysterious bearded man hacking does something illegal on a laptop, in the dark

nelen.ru
2018-01-08Fotolia
Man wearing hood in dark room

Man wearing hood in dark room

Elnur
2017-03-27Fotolia
Hacker tries to get into the cloud data transfer.

Hacker tries to get into the cloud data transfer.

natali_mis
2017-10-06Fotolia
Background of the cells, and the binary code.

Background of the cells, and the binary code.

Trifonenko Ivan
2015-03-04Fotolia
Man wearing hoodie hacking server in dark room

Man wearing hoodie hacking server in dark room

Africa Studio
2018-01-18Fotolia
File Security Protection Privacy Interface Concept

File Security Protection Privacy Interface Concept

Rawpixel.com
2016-06-01Fotolia
Save 3D with padlock

Save 3D with padlock

kaptn
2017-09-14Fotolia
mysterious male hacker sits in the dark and smokes a hookah

mysterious male hacker sits in the dark and smokes a hookah

nelen.ru
2018-01-08Fotolia
criminal bearded man hides his face under the hood, hacks the password on the laptop

criminal bearded man hides his face under the hood, hacks the password on the laptop

nelen.ru
2018-01-09Fotolia
Data Access

Data Access

kentoh
2016-06-12Fotolia
Anonymous hacker programmer uses a laptop to hack the system. Stealing personal data and infection of malicious virus.

Anonymous hacker programmer uses a laptop to hack the system. Stealing personal data and infection of malicious virus.

Artem
2018-06-11Fotolia
mysterious bearded man hides his face under the hood, hacks the laptop

mysterious bearded man hides his face under the hood, hacks the laptop

nelen.ru
2018-01-07Fotolia
Hacker hacking computer at night

Hacker hacking computer at night

Elnur
2017-11-06Fotolia
Hooded computer hacker with laptop

Hooded computer hacker with laptop

Jakub Krechowicz
2016-10-11Fotolia
hacker at work with graphic user interface around

hacker at work with graphic user interface around

Glebstock
2016-06-27Fotolia
mysterious bearded man hides his face under the hood, hacks the laptop, does something illegal and dangerous

mysterious bearded man hides his face under the hood, hacks the laptop, does something illegal and dangerous

nelen.ru
2018-01-07Fotolia
a criminal man hides his face under a hood, hacks a laptop, lots of smoke

a criminal man hides his face under a hood, hacks a laptop, lots of smoke

nelen.ru
2018-03-01Fotolia
Security.

Security.

BillionPhotos.com
2017-12-29Fotolia
Decoding encrypted digital hexadecimal data code

Decoding encrypted digital hexadecimal data code

gonin
2017-12-12Fotolia
Security.

Security.

BillionPhotos.com
2017-12-29Fotolia
a man hacker works behind a laptop and reaches for a notebook

a man hacker works behind a laptop and reaches for a notebook

nelen.ru
2018-01-15Fotolia
A computer hacker is typing on a smoking computer. Dark background

A computer hacker is typing on a smoking computer. Dark background

Roman
2017-12-19Fotolia
0:09Looped Cinemagraph: Working and Active Data Center with Server Racks Full of Blinking LED Lights.

Looped Cinemagraph: Working and Active Data Center with Server Racks Full of Blinking LED Lights.

Gorodenkoff
2018-10-31Fotolia
Hacker hacking computer at night

Hacker hacking computer at night

Elnur
2017-11-12Fotolia
Hacker using laptop. Hacking the Internet.

Hacker using laptop. Hacking the Internet.

BillionPhotos.com
2018-08-13Fotolia
cyber security internet and networking concept.Businessman hand working with VR screen padlock icon on mobile phone and laptop computer background

cyber security internet and networking concept.Businessman hand working with VR screen padlock icon on mobile phone and laptop computer background

everythingpossible
2017-08-07Fotolia
mysterious criminal man with a hood on his head hacking a laptop in the dark

mysterious criminal man with a hood on his head hacking a laptop in the dark

nelen.ru
2018-04-23Fotolia
Hacker accessing to personal data information with a computer 3D rendering

Hacker accessing to personal data information with a computer 3D rendering

sdecoret
2017-12-05Fotolia
0:25binary data in blue color at laptop

binary data in blue color at laptop

beautyartvision
2016-12-22Fotolia
guy hacker with a beard in a sweatshirt with a hood sits behind a laptop

guy hacker with a beard in a sweatshirt with a hood sits behind a laptop

nelen.ru
2018-01-10Fotolia
Padlock on a Laptop

Padlock on a Laptop

BillionPhotos.com
2018-08-15Fotolia
Password Protected Network Security Protection Concept

Password Protected Network Security Protection Concept

Rawpixel.com
2016-06-09Fotolia
Businessman watching connection network on a rooftop 3D rendering

Businessman watching connection network on a rooftop 3D rendering

sdecoret
2017-11-07Fotolia
male hacker in a sweatshirt with a hood sits behind a laptop

male hacker in a sweatshirt with a hood sits behind a laptop

nelen.ru
2018-02-06Fotolia
Network security and privacy crime. Mixed media

Network security and privacy crime. Mixed media

Sergey Nivens
2017-05-14Fotolia
A computer hacker is typing on a laptop in a smoky room.

A computer hacker is typing on a laptop in a smoky room.

Roman
2018-01-19Fotolia
Cyber Security.  Symbolic padlock in electronic cyberspace.

Cyber Security. Symbolic padlock in electronic cyberspace.

Sergey Tarasov
2015-04-29Fotolia
male hacker in a sweatshirt with a hood sitting at a table and looking at the laptop

male hacker in a sweatshirt with a hood sitting at a table and looking at the laptop

nelen.ru
2018-02-07Fotolia
An experienced hacker working on a laptop at home

An experienced hacker working on a laptop at home

nelen.ru
2018-01-10Fotolia
security key and binary code

security key and binary code

Spartak
2011-10-15Fotolia
Hacker accessing to personal data information with a computer 3D rendering

Hacker accessing to personal data information with a computer 3D rendering

sdecoret
2018-02-04Fotolia
Network security and privacy crime. Mixed media

Network security and privacy crime. Mixed media

Sergey Nivens
2017-05-11Fotolia
mysterious bearded man hacker smoking a hookah in the dark, hacking laptop

mysterious bearded man hacker smoking a hookah in the dark, hacking laptop

nelen.ru
2018-01-08Fotolia
Hacker accessing to personal data information with a computer 3D rendering

Hacker accessing to personal data information with a computer 3D rendering

sdecoret
2017-07-12Fotolia
criminal mysterious man hacking laptop, in the dark, smoke

criminal mysterious man hacking laptop, in the dark, smoke

nelen.ru
2018-01-12Fotolia
Security.

Security.

BillionPhotos.com
2017-12-29Fotolia
Blue shield icon as symbol of access protection on dark backgrou

Blue shield icon as symbol of access protection on dark backgrou

adam121
2017-06-01Fotolia
Innovative media technologies

Innovative media technologies

adam121
2015-09-13Fotolia
Internet network and data security. Hacker in black hoodie using computer laptop

Internet network and data security. Hacker in black hoodie using computer laptop

sasinparaksa
2018-05-27Fotolia
a man hacker in a sweatshirt with a hood is sitting at a table and something is typing in a laptop

a man hacker in a sweatshirt with a hood is sitting at a table and something is typing in a laptop

nelen.ru
2018-02-07Fotolia
young guy hacker in a sweatshirt with a hood on his head sits behind a laptop

young guy hacker in a sweatshirt with a hood on his head sits behind a laptop

nelen.ru
2018-01-09Fotolia
0:16Group of Teenage Hackers Have Successful Attack on Government Servers. Their Den Has Monitors, Dark Atmosphere. Shot on RED EPIC-W 8K Helium Cinema Camera.

Group of Teenage Hackers Have Successful Attack on Government Servers. Their Den Has Monitors, Dark Atmosphere. Shot on RED EPIC-W 8K Helium Cinema Camera.

Gorodenkoff
2017-05-25Fotolia
Próxima página
255075100
1 2 3 4 5 de 5
  • Imagens
  • Vídeos
  • Modelos
  • 3D
  • Premium
  • Editorial
  • Venda imagens

A Fotolia agora é o Adobe Stock

Tenha o melhor da Fotolia e muito mais

Você é novo no Adobe Stock? Receba 10 imagens gratuitas

Comece agora

Receba uma oferta exclusiva do Adobe Stock quando migrar sua conta da Fotolia para o Adobe Stock. Fazer logon na Fotolia

Use os ativos que só a Adobe oferece

Explore coleções com curadoria de imagens, ilustrações, vídeos e muito mais ativos de alta qualidade da maior comunidade criativa do mundo.


Empresas

Espaços de trabalho modernos.

Comida

Opções para todos.

Viagem

A passagem para o imaginário.

Animais de estimação

Melhores amigos peludos.

Família

Momentos com entes queridos.

Natureza

Beleza vinda do exterior.

Encontre a imagem ideal da maneira ideal.


Com a pesquisa visual viabilizada pelo Adobe Sensei, basta soltar uma imagem na barra de pesquisa para encontrar instantaneamente imagens semelhantes. Use filtros estéticos para ajustar sua pesquisa por espaço para texto, taxas de quadro, duração ou profundidade de campo. O recurso “Encontrar semelhantes” ajuda a refinar ainda mais seus resultados.

Fluxo de trabalho simplificado


Os ativos do Adobe Stock estão disponíveis nos seus aplicativos preferidos, desde o Microsoft PowerPoint até o Adobe Photoshop CC. Tudo para você gastar menos tempo pesquisando e mais tempo criando.

Fotolia

    • Sobre nós
    • Projeto TEN
    • Blog

Serviços

  • Como comprar
  • Venda imagens
  • Serviços corporativos

Ferramentas

  • API

Necessita de ajuda?

  • Suporte
  • Fórum
  • Contacto
banner
  • PT
    • FR
    • UK
    • US
    • DE
    • ES
    • IT
    • BR
    • JP
    • EU
    • PL
    • RU
    • CN
    • TR
    • KR
    • AU
    • AR
    • CL
    • MX
    • CO
    • ZA
    • NL
    • SE

Termos de usoPolítica de privacidade© Fotolia 2018Parte da família Adobe AdChoices

{"interception":{"ipc":false,"ii":"1"},"fotolia_range":{"search_max_xs_price":{"range_value":"all","range_min":1,"range_before_last_value":3,"range_max":"all","range_step":1,"range_value_labels":{"1":"1 cr\u00e9dito","2":"2 cr\u00e9ditos","3":"3 cr\u00e9ditos","all":"N\u00e3o filtrar"}}},"fotolia_color_picker":{"current_colors":[],"nb_max_colors":5},"fotolia_thumb_size":{"thumbs_container_class_by_size":{"160":"thumbs-list-medium","220":"thumbs-list-large","240":"thumbs-list-mosaic"}},"fotolia_tooltip":{"licenses_label":"Licen\u00e7as:"},"fotolia":{"host_base":"fotolia.com"}}