42 Consulting services in the fields of computer hardware and information technology systems development, engineering and integration in the fields of technology, science, engineering, finance, and healthcare; consulting services in the fields of information technology and cyber security, namely, computer and information technology network security, computer security threat audit for protecting data, and conformity with established cyber-security certification and accreditation standards; computer network and information technology network systems engineering services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of computer and information technology networks; providing engineering and systems analysis, and technical consulting in the field of software engineering; providing Advisory and Assistive Services (A and AS) services, namely, expert advice regarding computer software, hardware and information technology systems development, website design and development, and computer software, hardware and information technology systems network testing, computer modeling and computer simulation; design and management of enterprise information technology systems; cyber security services, namely, computer disaster recovery planning; design and implementation of information technology systems, and consulting services relating thereto; design of information technology systems used in telephone call centers, and consulting services related thereto; scientific research and engineering services for others, and project management services of scientific research programs for others; consulting services in the fields of design, selection, implementation and use of systems of computer hardware and networking equipment and combinations of computer hardware and networking equipment and software for others in the fields of technology, science, engineering, finance, and healthcare; consulting services relating to planning, design and analysis of computer hardware and networking equipment, systems of computer hardware and networking equipment and combinations of computer hardware and networking equipment and software for business process reengineering, information systems security, and information systems operation and maintenance support in the fields of technology, science, engineering, finance, and healthcare; computer consulting services, namely, computer systems analysis and design of computer systems and information technology systems for others in the fields of technology, science, engineering, finance, and healthcare; providing consulting services in design and development, integration and interfacing of computer hardware and software systems and networks and computer network architectures in the fields of technology, science, engineering, finance, and healthcare; consulting services in the fields of design, selection, implementation and use of software and software systems for others in the fields of technology, science, engineering, finance, and healthcare; consulting services relating to planning, design and analysis of software for business process reengineering, information systems security, and information systems operation and maintenance support; computer consulting services, namely, computer systems analysis and design of computer systems and information technology systems for others; design for others of software applications in the fields of technology, science, engineering, finance, and healthcare; providing software systems design and development for others in the fields of technology, science, engineering, finance, and healthcare; information technology consultation services; consulting services in design and development, integration and interfacing of computer systems and computer information networks and computer network architectures; and consultancy services for businesses in the fields of product development; cyber security services, namely, monitoring of computer systems and computer networks for digital asset security purposes by protecting data and information from unauthorized access, computer security threat audits for protecting data; consulting as to conformity with established cyber-security certification and accreditation standards, and reporting of unauthorized access to computer systems; consulting services in the fields of monitoring of computer systems and computer networks, resetting computer and network passwords, computer security threat audits for protecting data, and conformity with established cyber-security certification and accreditation standards, and reporting of unauthorized access to computer systems