Do you want to publish a course? Click here

Under the general rule in the proof of legal actions in the Syrian law on evidence in writing, shall not be proof of testimony only within the limits of quantitative quorum for the certificate as stipulated Syrian Evidence Act. However, evidence of proof the law has been passed to testify if required commitment exceeded the value of proven quantitative quorum of the certificate; if a literary mind if found without written guide. This study aims to indicate what the literary inhibitor; and by clarifying cases of literary inhibitor, which allows proof of testimony, also aims to demonstrate the power of the judiciary to appreciate the literary inhibitor, and the consequences of proven literary inhibitor and how to prove.
Computer crimes are Intelligent crimes committed in secret. The offender has a high level of technical expertise, and the main objective is to undermine the owners of the programs and information and their rights, whether natural or legal persons, and may extend to include the state and its secrets. The multiplicity of these crimes makes it difficult to detect, and pursue the offender, because they do not leave any trace behind. This makes it more difficult to prove and investigate.
The study aimed to identify the extent of auditors’ response to assessed risks of material misstatement due to fraud. To achieve the study objective a questionnaire was developed that included the most important audit procedures designed as respon ses to assessed risks of material misstatement due to fraud which are classified according to the International Auditing Standards into two main groups: overall responses at financial statement level, and other ones at assertion level; to identify the extent of auditors’ response to those risks within the research community represented by accredited auditors at Syrian Commission on Financial Markets and Securities (SCFMS).
Reviewed in this paper the most important conditions required by the legislation relating to rules of evidence, where we have to clarify the nature of electronic transactions based on the contracting without paper documents, and its importance and i ts role in facilitating the work of the government rather than paper documents. We concluded that the question of proof may constitute an obstacle to its development as the presence of paper documents is not consistent with the modern administration
Wireless sensor network have become widely used in many civil and military issues. Like all other network, it is exposed to attacks but its simplicity structured (CPU & memory) prevent the traditional defense technic to be applied, so they need a s pecial for defense. Most security researches focus on data righteousness and privacy, in this research we focus on attacks that aimed to the power resources which are referred as Denial Of Sleep attacks (DoS), in this attacks the attacker try to keep the sensor in active phase causing the power source to be drained very quickly so that it is a very dangerous attack. In this research we reviewed the sources of energy Loss in wireless sensor network and classified the attacks that target the power resource, we built a simulation module to analysis the B-MAC protocol response to denial of sleep attacks.
يسعى البحث إلى التعريف بنطاق تطبيق المبدأ في سوق العمل و الدوافع المختلفة له. فضلا عن البحث في موضوع إثباته، من خلال شرح كيفية إثبات التصرف التمييزي و الإجراءات القانونية الواجبة التطبيق في هذه الحالة. استنادًا إلى ما تقدم، ينقسم مخطط البحث إلى مبحثي ن رئيسين: الأول يتناول نطاق تطبيق مبدأ عدم التمييز، و الثاني يبحث في كيفية إثبات التصرف التمييزي.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا