42 (Based on 44(d) Priority Application) Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design and development of electronic data security systems; Design and development of home security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Inserting software protection programs and security programs onto magnetic media; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Research in the field of intelligence and security technology(Based on 44(e)) Computer consultation in the field of computer security; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security service, namely, hard drive erasure; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design and development of electronic data security systems; Design and development of home security systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Development of security systems and contingency planning for information systems; Development of software for secure network operations; Inserting software protection programs and security programs onto magnetic media; Maintenance of computer software relating to computer security and prevention of computer risks; On-line security services, namely, providing security and anonymity for electronically transmitted credit card transactions; Research in the field of intelligence and security technology