9 Computer hardware; computer peripherals; communications network interconnection hardware; routers, bridges, hubs, switches; data carriers; network hardware, cards, cables and devices; network security appliances; computer hardware and software for detecting, blocking and removing computer viruses and threats, securing networks, encrypting and authenticating data, preventing data-loss, recovering data; computer hardware and software for detecting, filtering, analyzing, managing and blocking electronic communications; hardware and software for scanning, detecting, quarantining, blocking and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, smart home devices, and electronic devices; Wireless communication devices; network access range expanders; computer hardware providing network security functions, firewalls, data encryption, interoperability with network security protocols; databases; data management software; electronic cyber-security systems for home computer network; electronic cyber-security systems for home Wi-Fi network; safety, security, protection and signaling devices; plug-in devices for routers; wireless transmitters and receivers; wireless computer peripherals; wireless communication devices; devices for wireless radio transmission; computer network monitoring device; computer and network intrusion detection and prevention systems; smart home devices; connected home devices; Security surveillance apparatus; network controlling apparatus; network communication equipment; telecommunication and wireless communication equipment; Computer network switches; artificial intelligence apparatus; artificial intelligence software; artificial intelligence software for surveillance; security software; security control apparatus; Utility, security and cryptography software; software for ensuring the security of electronic transmissions and telecommunications; firewall software; network management software; software for network and device security; computer software for managing and filtering electronic communications; computer software for encrypting and authenticating data; computer software for verifying compliance with security policies; computer software for detecting and repairing computer software, hardware, and computer network problems; telecommunications software for internet connectivity and management and monitoring of wireless connections; computer software and computer systems for monitoring, measuring, tracking and reporting computer network behavioral patterns; downloadable electronic publications in the field of IT, computing, cyber-security, artificial intelligence, and telecommunications; Software for the integration of artificial intelligence and machine learning in the field of Big Data