Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is sent to database, and update scripts periodically to close gaps in the site. Using 2Checkout company (2CO), which is trusted international electronic money transfer to allow customers pay money in a secure manner.
Energy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg
... Show MoreIt is known that the economic impact of medicines is not negligible as a pillar of national income because of the profits of its industry contribute to industrial development, and the health impact of medicines can not be underestimated or underestimated, as many people already die in various low-lying countries The middle income because of the difficulty in providing them with safe and effective essential medicines or their inability to buy them to be available to enable them to cure and save their lives.
This requires the development of policies and strategies to save lives by researching the concept of drug security to provide the best possible level of modern health care supported by soun
... Show MoreAfter the tremendous development witnessed by the world of communications at the beginning of the third millennium, the activities that are performed through cyberspace have increased, and its importance has therefore increased, and the risks to which this space is exposed have increased, and in view of the global trend towards regulating this space and the practices that take place through it, as well as finding legal and technical ways to secure it. And to secure the services that are provided through it, it was necessary to determine the nature of this space and therefore its security. In order to create an appropriate theoretical framework around it that may be used if the Iraqi legislator goes towards organizing this space and secur
... Show MoreAspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.
HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020
Local and global bifurcations of food web model consists of immature and mature preys, first predator, and second predator with the current of toxicity and harvesting was studied. It is shown that a trans-critical bifurcation occurs at the equilibrium point
In this research, we will discuss how to improve the work by dealing with the factors that
participates in enhancing small IT organization to produce the software using the suitable
development process supported by experimental theories to achieve the goals. Starting from
the selecting of the methodology to implement the software. The steps used are and should be
compatible with the type of the products the organization will produce and here it is the Web-Based Project Development.
The researcher suggest Extreme Programming (XP) as a methodology for the Web-Based
Project Development and justifying this suggestion and that will guide to know how the
methodology is very important and effective in the software dev
The need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ w
... Show More