09
Computer security software; computer antivirus software;
computer software for use in detecting and preventing
reverse engineering, modification, tampering, and hacking of
computer software, embedded software, and firmware; computer
software for use in big data analytics of hacking data;
anti-decompile, anti-repackaging, and anti-memory hack
software; computer software to detect unauthorized changes,
or attempts at piracy of computer software, embedded
software, and firmware; computer software to shut off access
of other computer software to network-based resources;
computer software to prevent unauthorized duplication of
computer software, embedded software, and firmware; computer
software for use in software and application development;
recorded computer software; downloadable computer software;
mobile applications; downloadable electronic publications.
42
Software as a service (SAAS) services featuring computer
security software; providing temporary use of online,
non-downloadable computer security software; software as a
service (SAAS) services featuring software for providing an
online dashboard of application usage and hacking data;
providing temporary use of online, non-downloadable computer
software for use in detecting and preventing reverse
engineering, modification, tampering, and hacking of
computer software, embedded software, and firmware;
providing temporary use of online, non-downloadable computer
software for use in big data analytics of hacking data;
providing temporary use of online, non-downloadable computer
antivirus software; providing temporary use of online,
non-downloadable computer software for use in software and
application development; providing temporary use of online,
non-downloadable anti-decompile, anti-repackaging, and
anti-memory hack software; providing temporary use of
online, non-downloadable computer software to detect
unauthorized changes, or attempts at piracy of computer
software, embedded software, and firmware; providing
temporary use of online, non-downloadable computer software
to shut off access of other computer software, embedded
software, and firmware to network-based resources; providing
temporary use of online, non-downloadable computer software
to prevent unauthorized duplication of computer software,
embedded software, and firmware; computer services, namely,
mobile application security services; computer services,
namely, detection and treatment of computer viruses via
computer and communication networks; computer services,
namely, diagnosis and remediation of website vulnerabilities
via computer and communication networks; computer services,
namely, diagnosis and remediation of application
vulnerabilities via computer and communication networks;
consultation in the field of computer security.
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen