9
Apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; Electric and electronic apparatus for security solutions in the field of information technology, included in class 9; Electric and electronic components, in particular for security solutions in the field of information technology, included in class 9; Data processing equipment, in particular for security solutions in the field of information technology, included in class 9; Computer hardware for preventing hacking into computers, networks, data processing systems, computer hardware for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Computer hardware for detecting and protecting against viruses, worms, trojans and similar malware; Computer hardware for security management in information technology; Computer modules and computer parts, in particular for computer, network and data processing security; Computer modules and computer parts for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Computer servers, in particular for security solutions in the field of information technology, included in class 9; Computer software, in particular for security solutions in the field of information technology; Computer software for securing computers, networks, data processing systems; Computer software for preventing hacking into computers, networks, data processing systems; Computer software for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Computer software for detecting and protecting against viruses, worms, trojans and similar malware; Computer software for security management in information technology; Interactive computer hardware and computer software for security solutions in the field of information technology; Compact discs, DVDs and other digital recording media with software stored thereon, in particular for security solutions in the field of information technology
37
Installation, maintenance, repair of electric and electronic equipment, in particular in the field of computer, network and data processing security; Installation, assembly, maintenance and repair of computer hardware, in particular for security solutions in the field of information technology; Installation, assembly, maintenance and repair of computer hardware for preventing hacking into computers, networks, data processing systems; Installation, assembly, maintenance and repair of computer hardware for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Installation, assembly, maintenance and repair of computer hardware for detecting and protecting against viruses, worms, trojans and similar malware; Installation, maintenance and repair of computers; Installation, maintenance and repair of computer systems, in particular for security solutions in the field of information technology; Installation, maintenance and repair of security systems for computer, network and data processing security; Installation, maintenance and repair of security systems for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Installation, maintenance and repair of security systems for detecting and protecting against viruses, worms, trojans and similar malware; Installation services and maintenance services, in particular in the field of computer, network and data processing security
38
Communications, in particular via digital networks; Internet-based telecommunications services; Data transmission, in particular via digital networks; Interactive transmission and communication; Transmission of digital files; Electronic transmission of computer programs via digital networks; Providing access to websites on the Internet; Providing electronic telecommunications networks and electronic databases; Communication services for access to databases; Connection services for databases
41
Providing of training, in particular in the field of computer, network and data processing security; Providing of training in relation to the detection of hacker attacks, the tracing of hacker attacks, the detection of weak spots in data processing systems; Providing of training in relation to security management in information technology; Arranging and conducting of training courses, courses, seminars, workshops, lectures, in particular in the field of computer, network and data processing security; Arranging and conducting of training courses, courses, seminars, workshops, lectures in relation to the detection of hacker attacks, the tracing of hacker attacks, the detection of weak spots in data processing systems; Sporting and cultural activities
42
Scientific and technological services and research and design relating thereto, In particular in the field of computer, network and data processing security; Industrial analysis and research services, in particular in the field of computer, network and data processing security; Consultancy in the field of computer hardware and computer software, in particular in relation to security solutions in the field of information technology; Professional consultancy relating to computer security; Provision of security services for computer networks, computer access and computerised transactions; Technological security testing in the field of computer, network and data processing security; Design and development of computer hardware and software, in particular for computer, network and data processing security; Design and development of computer hardware and software for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems; Design and development of computer hardware and software for detecting and protecting against viruses, worms, trojans and similar malware; Statements, Implementation, The installation, Servicing, Care, Updating and Adaptation of software, In particular in the field of computer, network and data processing security; Creating, implementing, installation, maintenance, upkeep, updating and adapting of software for detecting and protecting against viruses, worms, trojans and similar malware; computer software technical support services; software customization services, In particular in the field of computer, network and data processing security; Conducting technical project studies, In particular in the field of computer, network and data processing security; Technical project studies and technical project management, In particular in the field of computer, network and data processing security; Technical project planning and technical project management for preventing hacking into computers, networks and data processing systems; Technical project planning and technical project management for detecting hacker attacks, for tracing hacker attacks, for detecting weak spots in data processing systems