Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
خص ابن الجزري في كتابه هذا قراء الكوفة بمجموعه كبيرة من التراجم التي قدمها وفق صياغات منهجية منوعه اعتمدت على الأسس والضوابط التي التزم بها في تقديم تلك التراجم الخاصة بقراء الكوفة بصورة خاصة والتراجم الأخرى بصورة عامه مشيرا إليها من خلال بعض الصياغات الفنية في الروايات، فكان يشير إلى نوع العلاقة لمترجمة مع شيوخه من خلال عرضه للرواية ولاسيما في كثرة الرو
... Show MoreRecent technological developments in the mass media a major paradigm shift in important segments of society, particularly among young people in particular social networking sites including (Facebook) .
it was able to link the sprawling parts of the world and paved the way for all the communities of convergence and exchange views, ideas and desires as provided by their ability to communicate through the use of video clips,pictures,share files, chat, communicate and direct interaction between the audience for this the means. Wondered problem Find the role that can be played using the university youth to the social networking site (Facebook ) to modify their attitudes or their interest in Iraqi society issues, With focused research objec
The study aimed to reveal the level to which the international issues are integrated into the books of Saudi public education social studies and citizenship in the light of the principles of international education, and to know the level of continuity and integration of these issues in the books, to build a range and sequence matrix of international issues through it. The study followed the descriptive and analytical method that used the content analysis card as a tool for study when the tool achieved the necessary validity and reliability characteristics. The data of this study has been processed using the SPSS statistical program according to a set of appropriate methods of descriptive and inferential statistics.
The resu
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p
... Show MoreThe most important social and psychological problems that lead to Alzheimer's disease in the elderly (field study of a sample of people living in the city of Baghdad). The research aims to: 1. Identify the most important social, psychological and health problems of elderly people with Alzheimer's disease. 2. The most prominent solutions and treatments for people living with this disease. 3. rehabilitation and provision of social, psychological and medical services for people with Alzheimer's disease. The research stages of Alzheimer's disease and its symptoms and the most important causes of Alzheimer's disease, research has strengthened the theoretical framework. The theoretical study unexplained social pressure generating dealt with Al
... Show Moreعلى الرغم من تطور الدراسات التاريخية الخاصة بالمرأة بوصفها حقل معرفي مستقل بدأ منذ نهاية الستينيات من القرن الماضي .ونجاج الكاتبات والباحثات في العديد من بلدان الشرق الاوسط وشمال افريقيا في إعادة المرأة الى التاريخ، الا ان الكتابة التاريخية في العراق مازالت تعاني من نقص كبير في الموضوعات التي تناولت حياة النساء في الماضي. وما يزال الباحثات والباحثين ينظرون الى التاريخ على انه سردية للمعارك والحروب ويو
... Show MoreThe current research aims to measure the level of entrepreneurial orientation and its dimensions (creativity, independence, proactivity, risk tolerance, and achievement) in the National Security Chancellery, as its importance and role in guiding senior leaders of the chancellery to make strategic decisions with high quality in various Iraqi concerns, more specifically the security aspect. The data was collected from 94 individuals (the research sample) from the research community (120) individuals at different administrative levels and intentionally where the questionnaire was adopted as a main tool for data collection and the primary data was analyzed through descriptive and inferential statistical methods (arithmetic mean, standard dev
... Show MoreDespite the multiplicity of institutions contributing to the decision-making process in the United States of America, they interact to crystallize positions regarding international and strategic situations. The formulation of the national security policy depends on a number of institutions that complement each other in order to achieve an advanced security situation. Thus, the decision reflects the process of interaction of the existing regulatory institutions. This is because the essence of the national security and achieving its requirements also stems from the existence of a coherent system of shared beliefs and principles in the American society. Besides, these elements are the bases for achieving
... Show More