9 [ Scientific apparatus and instruments, namely, encoded smart cards containing programming used to send and receive data, encoded smart cards for security purposes containing programming used for secure access; card readers; encoded smart cards bearing stored data, encoded or magnetic cards all for sending and receiving data; scientific apparatus for the sending and receiving of data, namely, computers, transmitters and receivers; electrical and electronic apparatus for security purposes, namely, control access panels; communications equipment and authentication devices, namely, authentication computer servers, electronic token devices, namely, electronic encoded chip cards, access control equipment, biometric devices, namely, devices providing identification via physical characteristics such as facial recognition, iris scanning and finger point technology, and smart card readers; computers, computer hardware and] computer software for security management for computer networks and applications; web-based [ computer hardware] and software, namely, downloadable software designed to create and manage a secure computing environment; [ computer hardware and ] computer software for connection to and use of on-line services on the Internet; [ computer hardware and ] computer software for connection to computer networks, namely, the Internet; [ computer hardware and ] software for database access and searching; computer hardware and software for access control; computer hardware and software for use in cryptography; [ computer peripherals; integrated circuits; ] electronic publications, namely, catalogs, books, booklets, magazines, instruction manuals, newsletters and brochures on computer software products, upgrades for computer software products and computer accessories for others and computer software for network security, network management and network communications available on CD-Rom and available as a downloadable electronic publication; [ computer hardware and ] computer software for database management, computer programs for security management for computer networks and applications; computer programs designed to create and manage a secure computing environment; [ apparatus for searching electronic information from a global computer network or the Internet, namely, computers and personal digital hand-held computers; blank data carriers, namely, magnetic and electronic data carriers; pre-recorded data carriers, namely, magnetic and electronic data carriers featuring information for access control, authentication of identity, access to database, security network and security management; data processing equipment, namely, data processors; apparatus and equipment, namely, Internet remote access servers; Internet central security servers; apparatus and equipment for connection to computer networks, namely, computer hardware for Internet connection;] software [ and hardware ] for managing and monitoring the maintenance of the security and integrity of computer systems, local computer networks, intranet-nets, global computer networks and the Internet