9
Computer software for use in monitoring and controlling access to computer files and applications, enforcing usage policies for computer files and applications, preventing computer virus intrusion, tracking attempted access to prohibited computer files or applications, generating reports of attempted access to prohibited computer files or applications, and disarming execution of unapproved computer files or applications and instructional manuals sold as a unit therewith
41
Training in the use of computer software for use in monitoring and controlling access to computer files and applications, enforcing usage policies for computer files and applications, preventing computer virus intrusion, tracking attempted access to prohibited computer files or applications, generating reports of attempted access to prohibited computer files or applications, and disarming execution of unapproved computer files or applications, and distributing educational materials in connection therewith