Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
Founding a System to secure deposits and protecting the depositors is considered one of the important and exchanged subjects out there in the banking system/field in Iraq at the current time, and the reason behind the exchange and spread of this subject is due to the financial crisis of which the banking sector is suffering from and the stumbling of many banks, those factors have had led to the insecurity of the depositors and their mistrust towards banks, thus, it is necessary to create a system to secure deposits in which depositors would be compensated for the losses caused by the banks' failures. in addition, it could be a countermeasure system which maintains the banking stability, protects the rights of depositors and gains
... Show MoreThe aim of this study is to recognize the influence of model of active thinking in achievement ofeighth grade students andtheir visual thinking in science.The finds of this research show the superiority students of the experimental group who studied the science material by using the active thinking model on the students of the control group who studied by usual method, in the achievement test. Also the finds show that the students of the experimental group are more successful than students of control group in the test of visual thinking, so the two null hypotheses have been rejected. In light of the results of the research, numbers of recommendations were made.
This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ
... Show MoreThe research aims to identify the requirements of banking Entrepreneurial in Saudi Arabia and Singapore, where banking Entrepreneurial is an important way to lead employees to acquire the experience and knowledge required by the banking environment, so we note the pursuit of the banking management to acquire new technology proactively and distinctively to compete with others through the introduction of modern technologies that help senior management to develop new banking methods adaptable to the surrounding environmental changes. The problem of research highlights the extent to which the requirements of banking Entrepreneurial are applied in Saudi Arabia and the Republic of Singapore and will be addressed through three investigation
... Show MoreThis study examines the dynamic relationship between stock market and economic activity in the United States to verify the possibility of using financial indicators to monitor the turning points in the expected path of future economic activity. Has been used methodology (Johansen - Juselius) for the Co-integration and causal (Granger) to test the relationship between the (S & P 500 , DJ) index and gross domestic product (GDP) in the United States for the period
(1960-2009). The results of the analysis revealed the existence of a causal relationship duplex (two-way) between the variables mentioned. which means the possibility of the use stock market indicators to pre
Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pay
... Show MoreBackground: Cystoid Macular Edema (CME) in its various forms can be considered one of the leading causes of central vision loss in the developed world. It is not a disease itself, It represents a common pathologic sequel of the retina and occurs in a variety of pathological conditions such as, diabetic retinopathy, central or branch retinal vein occlusion(CRVO,BRVO), intraocular inflammation and following cataract extraction. Objective: This study was done to investigate the pattern of CME in patient attending Erbil Teaching Hospitals.Type of the study: Cross- sectional study.Methods and Materials: This is a hospital base cross- sectional study that included 61 patients (75 eyes) conducted at Erbil Teaching Hospitals for six months. All
... Show More