79044627
Jul 12, 2007
Jun 2, 2009
Computer software for use in protecting computer databases, operating programs and application programs against unauthorized infiltration and corruption [ ; data processing apparatus, namely, apparatus for recording, transmission, processing and reproduction of sound, images and data; computers and structural parts therefor; computer accessories; computer peripheral devices, namely, computer monitors, computer joysticks, computer keyboards, computer mice ]
Electrical and Scientific Apparatus[ Communications by computer terminals; computer-aided message and image transmission; communications by telegrams ]
TelecommunicationsPublication of on-line, non-downloadable electronic magazines featuring information, tracking and analysis of historical and current computer infiltration; electronic publishing of books and periodicals featuring information related to computer software, computer infiltration and computers; electronic publishing of texts featuring information related to computer software, computer infiltration and computers
Education and Entertainment[ Design and development of software, namely, of data protection software; ] advice, consulting and expert services relating to software for use in protecting computer databases, operating programs and application programs against unauthorized infiltration and corruption; providing information in the field of computer software and computers, namely, providing information in the field of virus protection, protecting computer databases, operating programs and application programs against unauthorized infiltration and corruption; [ rental of computers and computer accessories; ] professional consulting and advice services about computers, software and data processing apparatus, namely, professional consulting and advice services in the fields of selection, implementation and use of computer hardware and software systems for others, virus protection and protecting computer databases, operating programs and application programs against unauthorized infiltration and corruption
Computer and Scientific