9
Apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; Information technology and audiovisual equipment; Apparatus, instruments and cables for electricity; Electric and electronic apparatus for security solutions in the field of information technology, included in class 9; Electric and electronic components, in particular for security solutions in the field of information technology, included in class 9; Data processing equipment, in particular for security solutions in the field of information technology, included in class 9; Computer hardware for preventing hacking into computers, networks, data processing systems, computer hardware for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Computer hardware for detecting and protecting against viruses, worms, trojans and similar malware; Computer hardware for security management in information technology; Computer modules and computer parts, in particular for computer, network and data processing security; Computer modules and computer parts for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Computer servers, in particular for security solutions in the field of information technology, included in class 9; Computer software, in particular for security solutions in the field of information technology; Computer software for securing computers, networks, data processing systems; Computer software for preventing hacking into computers, networks, data processing systems; Computer software for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Computer software for detecting and protecting against viruses, worms, trojans and similar malware; Computer software for security management in information technology; Interactive computer hardware and computer software for security solutions in the field of information technology; Compact discs, DVDs and other digital recording media with software recorded thereon, in particular for security solutions in the field of information technology
35
Advertising, marketing and promotional services; Commercial services and consumer information, namely brokerage, organising business contacts, collective buying, commercial evaluation, import and export, negotiation and brokerage, ordering, price comparison, procurement services, for others; Retailing and wholesaling in relation to information technology and audiovisual apparatus, electric and electronic apparatus for security solutions in the field of information technology, electric and electronic components, data processing equipment, computer software, compact discs, DVDs and other digital recording media with software recorded thereon; Business assistance, management and administrative services; Business administration; Office functions; Business analysis, research and information services
37
Installation, maintenance, repair of electric and electronic equipment, in particular in the field of computer, network and data processing security; Installation, assembly, maintenance and repair of computer hardware, in particular for security solutions in the field of information technology; Installation, assembly, maintenance and repair of computer hardware for preventing hacking into computers, networks, data processing systems; Installation, assembly, maintenance and repair of computer hardware for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Installation, assembly, maintenance and repair of computer hardware for detecting and protecting against viruses, worms, trojans and similar malware; Installation, maintenance and repair of computers; Installation, maintenance and repair of computer systems, in particular for security solutions in the field of information technology; Installation, maintenance and repair of security systems for computer, network and data processing security; Installation, maintenance and repair of security systems for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Installation, maintenance and repair of security systems for detecting and protecting against viruses, worms, trojans and similar malware; Installation services and maintenance in the field of computer, network and data processing security
38
Electronic communications, in particular via digital networks; Telecommunication services, In particular internet-based telecommunications; Computer communication and Internet access; Data transmission, in particular via digital networks; Information transmission services via digital networks; Interactive broadcasting and communications services; Transmission of digital files; Electronic transmission of computer programs via digital networks; Providing access to web sites on the internet; Providing access to electronic communications networks and electronic databases; Communications services for accessing a data-base; Data bank interconnection services
41
Providing of training, in particular in the field of computer, network and data processing security; Providing of training in relation to the detection of hacker attacks, the tracing of hacker attacks, the detection of weak spots in data processing systems; Providing of training in relation to security management in information technology; Arranging and conducting of training courses, courses, seminars, workshops, lectures, in particular in the field of computer, network and data processing security; Arranging and conducting of training courses, courses, seminars, workshops, lectures in relation to the detection of hacker attacks, the tracing of hacker attacks, the detection of weak spots in data processing systems; Sporting and cultural activities
42
Scientific and technological services and research and design relating thereto, In particular in the field of computer, network and data processing security; Industrial analysis and research services, in particular in the field of computer, network and data processing security; Consultancy in the field of computer hardware and computer software, in particular in relation to security solutions in the field of information technology; Professional consultancy relating to computer security; IT security, protection and restoration; Development of technologies for the protection of electronic networks; Design services relating to the creation of networks; Provision of security services for computer networks, computer access and computerised transactions; Technological security testing, in particular in the field of computer, network and data processing security; Monitoring of network systems; Design and development of computer hardware and software, in particular for computer, network and data processing security; Design and development of computer hardware and software for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Design and development of computer hardware and software for detecting and protecting against viruses, worms, trojans and similar malware; Statements, Implementation, The installation, Servicing, Care, Updating and Adaptation of software, In particular in the field of computer, network and data processing security; Creating, implementing, installation, maintenance, upkeep, updating and adapting of software for detecting and protecting against viruses, worms, trojans and similar malware; Implementation of computer programs on networks; Computer software technical support services; Software customisation services, In particular in the field of computer, network and data processing security; Technical project studies, In particular in the field of computer, network and data processing security; Technical project planning and technical project management, in particular in the field of computer, network and data processing security; Technical project planning and technical project management for preventing hacking into computers, networks and data processing systems; Technical project planning and technical project management for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems