$placeNoAds is not true
placeAds(The mark consists of the stylized wording NORD SECURITY to the right of a stylized circle with a silhouette of a mountain with three peaks inside of the circle.;Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, Hologram apparatus, Photocopying apparatus, Telephone apparatus, Video transmission apparatus, Audio switching apparatus, Sound transmitting apparatus, Film reproducing apparatus, Sound reproducing apparatus, Data processing apparatus, Wireless telephony apparatus, Encoding and decoding apparatus and instruments, Digital telephone switching apparatus, Remote control telemetering apparatus, Apparatus for transmission of communication, Global positioning system (GPS) apparatus, Record playing apparatus and instruments, Antennas for wireless communications apparatus, Surveying machines and instruments, Weighing apparatus and instruments, Electronic navigational and positioning apparatus and instruments, Video recorders and video reproducing apparatus, Remote control telemetering machines and apparatus, Apparatus for recording, transmission, processing and reproduction of sound, images or data, Electronic apparatus and instruments for controlling, adjusting and testing of drives and motors, Cable broadcast transmission machines and apparatus, Open-wire transmission machines and apparatus; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity; apparatus and instruments for recording, transmitting, reproducing or processing sound, images or data; recorded and downloadable media, pre-recorded DVDs, downloadable audio and video recordings, and CDs featuring and promoting privacy and security; computer software; blank digital or analogue recording and storage media; computers and computer peripheral devices; computer hardware; software; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; application software; downloadable authentication software; for identifying and authenticating users and ensuring privacy and security; downloadable cloud computing software; for ensuring privacy and security; cloud computing software; security software; cloud servers; computer network server; computer networks; computer software; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer software for web content filtering; computer software packages; computer software which facilitates data compression; computer software which facilitates the routing of communications and data; cryptography software; data communications software; data networks; data processing software; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet; downloadable computer software for providing secure and private access for users to the Internet; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet; encryption software; local area networks; mobile software in the nature of downloadable computer application software for mobile phones, software for ensuring privacy and security; network access server operating software; network management software; proxy server software; VPN (virtual private network) operating software; VPN (virtual private network) hardware; email software; electronic mail terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, encryption software to enable secure transmission of digital information, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data; computer software for encryption; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for identity security; computer software for authentication and identity management information security; computer software for digital information and data access; computer software and firmware for the management, transmission, and storage of data and information; computer software for use in networking computers; computer software for use in monitoring computers and websites for security purposes; computer software for use in accessing databases; computer software for use in vulnerability scanning of networks and websites;Telecommunications services; email services; mail (electronic -); electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; data communication by electronic mail; providing electronic transmission of secure e-mail and data; communication via virtual private networks; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; transmission of encrypted communications; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services; provision of access to data or documents stored electronically in central files for remote consultation;licensing of databases; software licensing; security services;Scientific and technological services and research and design relating thereto, scientific research, analysis, testing, and design in the field of privacy and security; design and development of computer hardware and software; data security services; cloud computing; cloud computing services; computer network configuration services; computer network services; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; encryption, decryption and authentication of information, messages and data; information services relating to the development of computer networks; monitoring of network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) featuring software for providing traffic routing of data; software as a service (SaaS) featuring software for ensuring privacy and securty; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; encryption and decryption of data; computer services, on-line scanning and detecting of malware on websites; technical and customer support services, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, managed computer network and Internet security services, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, installation, design and customization; enterprise software integration; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, analyzing global computer information network and internal computer network vulnerability; application hosting; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid;, 'body') is not true
Brands and Their Owners
Welcome to the Brand page for “NORD SECURITY”, which is offered here for The mark consists of the stylized wording nord security to the right of a stylized circle with a silhouette of a mountain with three peaks inside of the circle.;scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, hologram apparatus, photocopying apparatus, telephone apparatus, video transmission apparatus, audio switching apparatus, sound transmitting apparatus, film reproducing apparatus, sound reproducing apparatus, data processing apparatus, wireless telephony apparatus, encoding and decoding apparatus and instruments, digital telephone switching apparatus, remote control telemetering apparatus, apparatus for transmission of communication, global positioning system (gps) apparatus, record playing apparatus and instruments, antennas for wireless communications apparatus, surveying machines and instruments, weighing apparatus and instruments, electronic navigational and positioning apparatus and instruments, video recorders and video reproducing apparatus, remote control telemetering machines and apparatus, apparatus for recording, transmission, processing and reproduction of sound, images or data, electronic apparatus and instruments for controlling, adjusting and testing of drives and motors, cable broadcast transmission machines and apparatus, open-wire transmission machines and apparatus; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity; apparatus and instruments for recording, transmitting, reproducing or processing sound, images or data; recorded and downloadable media, pre-recorded dvds, downloadable audio and video recordings, and cds featuring and promoting privacy and security; computer software; blank digital or analogue recording and storage media; computers and computer peripheral devices; computer hardware; software; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; application software; downloadable authentication software; for identifying and authenticating users and ensuring privacy and security; downloadable cloud computing software; for ensuring privacy and security; cloud computing software; security software; cloud servers; computer network server; computer networks; computer software; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer software for web content filtering; computer software packages; computer software which facilitates data compression; computer software which facilitates the routing of communications and data; cryptography software; data communications software; data networks; data processing software; downloadable computer software for enabling virtual private network (vpn) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the internet; downloadable computer software for providing secure and private access for users to the internet; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the internet; encryption software; local area networks; mobile software in the nature of downloadable computer application software for mobile phones, software for ensuring privacy and security; network access server operating software; network management software; proxy server software; vpn (virtual private network) operating software; vpn (virtual private network) hardware; email software; electronic mail terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the internet and other computer networks; computer software, encryption software to enable secure transmission of digital information, confidential, financial and credit card information over the internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, public key infrastructure (pki) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data; computer software for encryption; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for identity security; computer software for authentication and identity management information security; computer software for digital information and data access; computer software and firmware for the management, transmission, and storage of data and information; computer software for use in networking computers; computer software for use in monitoring computers and websites for security purposes; computer software for use in accessing databases; computer software for use in vulnerability scanning of networks and websites;telecommunications services; email services; mail (electronic -); electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; data communication by electronic mail; providing electronic transmission of secure e-mail and data; communication via virtual private networks; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (vpn) operation [digital data communication services]; transmission of encrypted communications; providing users with secure remote access via the internet to private computer networks; providing virtual private network (vpn) services; remote data access services; provision of access to data or documents stored electronically in central files for remote consultation;licensing of databases; software licensing; security services;scientific and technological services and research and design relating thereto, scientific research, analysis, testing, and design in the field of privacy and security; design and development of computer hardware and software; data security services; cloud computing; cloud computing services; computer network configuration services; computer network services; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; encryption, decryption and authentication of information, messages and data; information services relating to the development of computer networks; monitoring of network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (saas) featuring anti-ad software; software as a service (saas) featuring anti-malware software; software as a service (saas) featuring anti-spam software; software as a service (saas) featuring anti-spyware software; software as a service (saas) featuring anti-tracking software; software as a service (saas) featuring privacy violation detection software; software as a service (saas) featuring web content filtering software; software as a service (saas) for providing data compression software; software as a service (saas) featuring software for providing traffic routing of data; software as a service (saas) featuring software for ensuring privacy and securty; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (vpn) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; encryption and decryption of data; computer services, on-line scanning and detecting of malware on websites; technical and customer support services, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, managed computer network and internet security services, public key infrastructure (pki) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, installation, design and customization; enterprise software integration; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, analyzing global computer information network and internal computer network vulnerability; application hosting; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, providing on-line, non-downloadable software for computer security testing in the fields of computer and internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, providing authentication of business identification information; computer security services in the nature of providing an internet trust center, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid;.
Its status is currently believed to be active. Its class is unavailable. “NORD SECURITY” is believed to be currently owned by “NordSec Ltd”.
Owner: |
NORDSEC LTD
Owner Details |
---|---|
Description: |
The mark consists of the stylized wording NORD SECURITY to the right of a stylized circle with a silhouette of a mountain with three peaks inside of the circle.;Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, Hologram apparatus, Photocopying apparatus, Telephone apparatus, Video transmission apparatus, Audio switching apparatus, Sound transmitting apparatus, Film reproducing apparatus, Sound reproducing apparatus, Data processing apparatus, Wireless telephony apparatus, Encoding and decoding apparatus and instruments, Digital telephone switching apparatus, Remote control telemetering apparatus, Apparatus for transmission of communication, Global positioning system (GPS) apparatus, Record playing apparatus and instruments, Antennas for wireless communications apparatus, Surveying machines and instruments, Weighing apparatus and instruments, Electronic navigational and positioning apparatus and instruments, Video recorders and video reproducing apparatus, Remote control telemetering machines and apparatus, Apparatus for recording, transmission, processing and reproduction of sound, images or data, Electronic apparatus and instruments for controlling, adjusting and testing of drives and motors, Cable broadcast transmission machines and apparatus, Open-wire transmission machines and apparatus; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity; apparatus and instruments for recording, transmitting, reproducing or processing sound, images or data; recorded and downloadable media, pre-recorded DVDs, downloadable audio and video recordings, and CDs featuring and promoting privacy and security; computer software; blank digital or analogue recording and storage media; computers and computer peripheral devices; computer hardware; software; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; application software; downloadable authentication software; for identifying and authenticating users and ensuring privacy and security; downloadable cloud computing software; for ensuring privacy and security; cloud computing software; security software; cloud servers; computer network server; computer networks; computer software; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer software for web content filtering; computer software packages; computer software which facilitates data compression; computer software which facilitates the routing of communications and data; cryptography software; data communications software; data networks; data processing software; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet; downloadable computer software for providing secure and private access for users to the Internet; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet; encryption software; local area networks; mobile software in the nature of downloadable computer application software for mobile phones, software for ensuring privacy and security; network access server operating software; network management software; proxy server software; VPN (virtual private network) operating software; VPN (virtual private network) hardware; email software; electronic mail terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, encryption software to enable secure transmission of digital information, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data; computer software for encryption; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for identity security; computer software for authentication and identity management information security; computer software for digital information and data access; computer software and firmware for the management, transmission, and storage of data and information; computer software for use in networking computers; computer software for use in monitoring computers and websites for security purposes; computer software for use in accessing databases; computer software for use in vulnerability scanning of networks and websites;Telecommunications services; email services; mail (electronic -); electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; data communication by electronic mail; providing electronic transmission of secure e-mail and data; communication via virtual private networks; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; transmission of encrypted communications; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services; provision of access to data or documents stored electronically in central files for remote consultation;licensing of databases; software licensing; security services;Scientific and technological services and research and design relating thereto, scientific research, analysis, testing, and design in the field of privacy and security; design and development of computer hardware and software; data security services; cloud computing; cloud computing services; computer network configuration services; computer network services; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; encryption, decryption and authentication of information, messages and data; information services relating to the development of computer networks; monitoring of network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) featuring software for providing traffic routing of data; software as a service (SaaS) featuring software for ensuring privacy and securty; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; encryption and decryption of data; computer services, on-line scanning and detecting of malware on websites; technical and customer support services, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, managed computer network and Internet security services, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, installation, design and customization; enterprise software integration; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, analyzing global computer information network and internal computer network vulnerability; application hosting; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid;
|
Categories: |