Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
The research seeks to study the subject (Media separation: the Relationship of Arab Immigrants with the Media of the Countries of Diaspora/ Sweden as a model). Where this phenomenon, "problem" has not been subjected to an in-depth study to find out the causes of this media separation and its repercussions on the immigrant, whether in the problem of integration, or his opportunity to work, or adapt to live in the new society.
Separation is a kind of word that is rarely used in Arabic media studies, relevant, sometimes, to the meaning of “refraining from watching TV or listening to the radio or reading newspapers”. Sometimes, it means “not tuning to or using any form of media like radios or newspapers to be updated about what
... Show MoreArab Food's Security
The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The ro
... Show MoreThe modern nation state, by virtue of its institutional nature, is divided into political and non-political institutions according to their respective jurisdictions. It is natural for non-political institutions to perform their functions under the control of the political establishment, for two reasons: first, Second: Ensuring the achievement of cooperation, harmony and integration between these different institutions in serving the stability of the society and its continuity and achieving its supreme objectives. The location of the military establishment is part of the non-political institutions of the state, since it carries out a non-political function that is based on defending the homeland against any threats that may threaten its s
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreThis study was conducted to investigate the effect of feeding diets containing different levels of parsley on the hematological traits of local Iraqi geese. A total of twenty-four local geese, one year old, were used in this experiment. The birds were allocated into four treatment groups, consisting of six geese each. Treatment groups were: control diet (C) (free from parsley); T1: control diet + 80 g/d parsley; T2: control diet + 160 g/d parsley; and T3: control diet + 240 g/d parsley. At the end of the experiment, blood samples were obtained from all geese from the brachial vein by venipuncture. Hematological traits included in this study were red blood cells count (RBC), hemoglobin concentration (Hb), packed cell volume (PCV), mean cell
... Show Moreيعد علم الفلك أحد العلوم القديمة، فقد إهتم علماء الفلك الأوائل بهذ العلم، تاركين بصماتهم عليه، ودعوا إلى عدم الخلط بين علم الفلك وبين التنجيم، وهو نظام يعتقد أن هناك علاقة بين الشؤون الإنسانية ومواضع الأجسام السماوية، حيث يختلف المجالان تماماً عن بعضهما، كما ناقش العرب عدم سكونية الأرض في مركز الكون، وإنها كانت محور إهتمام الفلاسفة كأبن سينا والرازي، ومن ثم العلماء الفلكيين كالبيروني والخوار
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreThe research team seeks to study the phenomena of random housing in Iraqi society in general and Baghdad city in particular by standing on the causes behind this phenomena and its relation with security situation in Baghdad. The researchers adopted a theoretical and practical framework. The main objective is to diagnose the risks caused by the escalation of slums in Baghdad city.