Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
The present study aims at finding out the (effect of the Caroll’s pattern on the second intermediate class pupils' achievement in geography)
The partial experimental design of two groups, experimental and control, with pre-post tests is used. The sample is represented in (74) female pupils. The sample is divided into two groups (38) experimental group and (36) control one. The sample is selected from first intermediate class pupils ( Am Salama Secondary School for girls) \ Baghdad\ Al-karkh-1, for academic year 2015-2016.
The researcher has equalized the two groups in several variables: the previous achievement tests, intelligence, age in months, the scor
... Show MoreThe current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show MoreThe Results of Theoretical Studies and Experiment of Advanced Economies , Have Been Proven That Investment Expenditure Is Not The Only Factor And The Main Source of Production Growth, But Efficient Using Of The Fixed Assets Is More Important In This Process, All That Depends On Groups of Factors Called The Non-Investment Economic Growth, That Are Un-bodied Technical Progress With Organizational Nature.
It's Distinguished Features That it has An Influence on The Production Growth Without Any Large Additional Investment Expenditure Or Any Additional Increment in Inputs And That Can Not Be Reached Without Activating The Factors of Non-Investment Economic Growth, Which is Still Affecting Negatively In T
... Show MoreThe subject of demand on oil derivative has occupied an important position at present time in the daily life context. The fuel of benzene and gas oil and kerosene is one of basic elements of that concern, and on local , regional and international levels. The oil derivatives have played a leading role in determining the course and nature of development since early 1970 to the present time whether in the productive Arab countries or the importing. The researcher set out from the hypothesis that the increase of the local consumer demand on some of the oil derivatives is because of the internal and external factors accompanied by the inability of the productive capability and local production to confront this increase, and the resort
... Show MoreSocial networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the ques
... Show MoreThe research, which was drawn from his doctoral thesis (People's Policy towards Vietnam 1949-1979), discussed the roots of the connections between the Chinese and Vietnamese communists since the 1920s, the presence of Ho Chi Minh and other Vietnamese communists in China, their influence by the revolutionary struggle of the Chinese Communist Party and their establishment of a group of The Vietnamese Revolutionary Societies and the Indo-Chinese Communist Party until the outbreak of the Vietnamese Revolution and their success in declaring the establishment of the Democratic Republic of Vietnam in 1946. Keywords: Ho Chi Minh, Chinese Communist Party, Indo-Chinese Communist Party, Democratic Republic of Vietnam, Chou En Lai.
This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p
... Show More