Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.
Abstract
Leadership has now become a process for applying methods and techniques that make the Organization at the top of its competitive pyramid a greater market share. Leadership has become a focus for all leaders and managers، and leaders and managers are increasingly seeking to develop their skills and leadership skills. The research started with a clear problem of specific questions to ensure that the general objective of the research is to describe the characteristics of the leader and to clarify the dimensions of empowering the workers and to highlight the role of the leader in empowering the workers. The study examines the relation between the role of the leader in
... Show MoreResearch aimed to explore the Application Effect of the Conflict Management Strategies by the managements to solve conflict between and inside the conflicted parties within (IGEC) to increase the productivity of the workers. To collect data, 110 questioners had been distributed among managers and heads of departments of all managerial levels, 102 answered questioners regained, 5 of them were disqualify for statistical analytic, only 97 were taking in consideration for statistical analysis presenting 93% of the retained number.
SPSS Program supported with a group of statistical tools, had been used for analysis purposes such as Kronbach Alpha test to assure the validity & stability of the t
... Show MoreThis paper argues the accuracy of behavior based detection systems, in which the Application Programming Interfaces (API) calls are analyzed and monitored. The work identifies the problems that affecting the accuracy of such detection models. The work was extracted (4744) API call through analyzing. The new approach provides an accurate discriminator and can reveal malicious API in PE malware up to 83.2%. Results of this work evaluated with Discriminant Analysis
The aim of the current research is to identify the level of organizational culture among the headmasters and teachers of intermediate and secondary schools in Arar city. It also aims to identify the effect of job variables, qualifications, educational stage, and years of experience on the level of organizational culture and its domains. The research sample consisted of 62 participants divided into 7 headmasters and 55 teachers. The researcher used the questionnaire of the organizational culture. The researcher used also statistical methods such as mean, standard deviation, t-test, and One way ANOVA. The results revealed that the level of organizational culture and its four domains were high, and there was no effect of the variables (teac
... Show MoreSuffer most of the facilities of the high cost of inventory , which affects the high cost of the product and thus affects many administrative decisions , as well as suffer the facilities of the systems developed by the provisions of inventory control , and this problem is exacerbated in the construction sector where the inventory in the form of Construction spin of the Year for another it becomes difficult to control the cost effectively , and is the research problem in question follows: What are the implications of the use of the system in time inventory accounting system for the contracting company does kills Alrkaah to the provisions of the cost of inventory and what is the optimal approach to inventory control ? Find assumed
... Show MoreBackground: Dental implants are a suitable option for the replacement of some or all missing teeth. The successful insertion of a biocompatible material into living tissue with little to no evidence of rejection has revolutionized medicine and dentistry. An increase in bone response was observed with local administration of growth hormone around dental implants. Growth hormone may act as a bone stimulant in the placement of endosseous dental implants and enhances osseointegration. The aim of the study was to evaluate immunohistochemically the effect of the topical application of growth hormone on the osseointegration of cpTi implant. Materials and Methods: Eighty titanium screw implants were inserted in the tibia of the forty adult rabbits.
... Show MoreVirtual reality, VR, offers many benefits to technical education, including the delivery of information through multiple active channels, the addressing of different learning styles, and experiential-based learning. This paper presents work performed by the authors to apply VR to engineering education, in three broad project areas: virtual robotic learning, virtual mechatronics laboratory, and a virtual manufacturing platform. The first area provides guided exploration of domains otherwise inaccessible, such as the robotic cell components, robotic kinematics and work envelope. The second promotes mechatronics learning and guidance for new mechatronics engineers when dealing with robots in a safe and interactive manner. And the thir
... Show MoreA new simultaneous spectrophotometric-kinetic method was developed to determine phenylephrine (PHEN) and tetracycline (TETR) via H-point standard addition method (HPSAM). The proposed procedures rely on the measurements of the difference in the rate of charge-transfer (CT) reaction between each of PHEN and TETR as electron donors with p-Bromanil (p-Br) as an electron acceptor. Different experimental factors which affect the extent of the complex formation were investigated by monitoring the value of absorbance at 446 nm. Time pair of 50 -100 sec was selected and employed, among different examined pairs since it results in the highest accuracy for HPSAM-plot. Linear calibration graphs in the concentration ranges of 10.0-40.0 and 10.0–50.0
... Show MoreThe results of previous scientific studies showed that knowledge is something and application is something else, that's why teachers' preparation programs focused, in the present time, on special standards for knowledge and performance, i.e., who has knowledge is not necessary able to apply it in his life or in his field of work, which led to the existence of a gap between knowledge and application. Based on that, those interested in (teachers' preparation) reconsidered their work evaluation, thus the concept of competency appeared at the end of the sixties of the past century to address the negative in teachers' preparation.
The following contains a number of competency features in teachers' preparation programs:
Teachers' effec
Background: Wound healing, as a normal biological process in the human body, is achieved through four precisely and highly programmed phases: hemostasis, inflammation, proliferation, and remodeling. Growth factors released in the traumatized area promote cell migration into the wound area (chemotaxis), stimulate the growth of epithelial cells and fibroblasts (mitogenesis), initiate the formulation of new blood vessels (angiogenesis), and stimulate matrix formation and remodeling of the affected region. One of factors that effects on wound healing is a sex hormones and one of these hormones is an estrogen hormone. A wide range of cutaneous cell types (eg, fibroblast, endothelial, epithelial, and inflammatory) expressed estrogen receptors, in
... Show More