42 Design and development of computer hardware, software, computer systems and data exchange systems; technical advice on the use, application, maintenance and updating of computer software; design and development of computer and communication networks; design of programs for computers and microprocessors; technological assistance in the field of data communication; development of software for online operating and presenting of results of monitoring on computer and communication networks; scientific research in the field of analyzing crimes and the security of information, computers, communications and computer networks and computer systems; computer security for preventing piracy and information deterioration; recovery of lost and/or deleted data; remote monitoring of computer systems and computer and communication networks; information, consultancy, advice in the field of computers, computer security, the security of computers, communication networks and computer systems; security services for protection against any unauthorized access to communications or computer networks; on-line advice and information in the field of computer software relating to computer security; computer programming for others in the field of computer security; advisors' services in the field of computer security relating to critical incident responses in the context of compromises in the security of information, computers, computer and communication networks and computer systems; advisors' services in the field of maintaining the security and integrity of computers, computer and communication networks, computer systems and databases; implementation of security measures in the prevention of risks of intrusion to computers, computer and communication networks and computer systems, and critical incident responses to in the context of compromises in the security of information, computers, computer and communication networks and computer systems; monitoring, testing, analyzing and/or monitoring of data pertaining to detecting, processing, surveillance, analyzing of intrusions to computers and/or computer networks; development, optimisation, monitoring and testing of performance for methods, algorithms, processing and software modules for the generation of data pertaining to detecting, processing, surveillance, analyzing of intrusions to computers and/or computer networks; scientific research and providing advice in the field of analysis of vulnerability, risk and the security of computers, computer systems and computer and computer communication networks; computer services enabling the analysis of data for generating and transmitting reports and evaluations relating to the security level of software for others; computer data processing (programming) pertaining to detecting, processing, surveillance, analyzing of intrusions to computers and/or on networks for experiments and simulations; development of software for the online operation and presentation of personal and targeted information on companies or individuals and online reputation management; certification services, namely certification in the field of computer security and the security of computer and communication networks; design and development of computer hardware, computer programs, integrated circuits, microcircuits, printed circuits, processors, central processing units, microprocessors, microcontrollers, electronic tags, chip cards, memory cards, integrated circuit cards (smart cards), electronic payment cards, access control cards, smart cards with displays, electronic devices for controlling access, authorization or authentication, electronic tokens; technological expertise and technological advice to others in relation to the protection of the intellectual property rights thereof; appraisals, analysis and management of risk in the field of the security and safety of computers, computer and communication networks and computer systems; installation, repair, maintenance and updating of computer software intended for protection against computer viruses, intrusions and attempted intrusions of computers and/or on computer networks; installing, repairing, maintaining and updating computer software enabling the collecting and use of data relating to the security of computers, computer and communication networks and computer systems, the encryption and decryption of data, compromises in the security of computers, computer and communication networks and the responses to be taken, access control, authorization management and monitoring of the use of the Internet, computer viruses, intrusions or attempted intrusions of computers, computer or communication networks and computer systems, decisions and advice in the case of the detection of intrusions of attempted intrusions of computers, communication and computer networks and computer systems, threats relating to computer hardware and software and computer systems, and the prevention of data loss; installing, repairing, maintaining and updating computer software enabling the efforts to tackle risks relating to the security of computers, computer and communication networks and computer systems, authorization management, computer viruses, intrusions or attempted intrusions of computers, computer or communication networks and computer systems, decisions and advice in the case of the detection of intrusions of attempted intrusions of computers, communication and computer networks and computer systems, threats relating to computer hardware and software and computer systems, and data loss; installing, repairing, maintaining and updating computer software used for storage of data and user terminals for the processing, monitoring and analyzing data relating to the detection of intrusions or attempted intrusions of a computer and/or messages relating to computer intrusions, for assisting decisions and advice in the case of detection of intrusions or attempted intrusions of computers and/or on computer networks, and for the automatic response in the case of detection of intrusions or attempted intrusions of computers and/or on computer networks; installing, repairing, maintaining and updating software for protection against computer viruses; advisors' services relating to the security of computers and/or on networks; provision of information relating to the security of computers and/or on networks; monitoring of computer systems for security purposes