Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 4,090

Application Security Verification Standard 4.0

https://community.mis.temple.edu/mis5214sec001spring2025/files/2025/01/OWASP-Application-Security-Verification-Standard-4.0.3-en-3.pdf

1.2.3 Verify that the application uses a single vetted authentication mechanism that is known to be secure, can be extended to include strong authentication, and has sufficient logging and monitoring to detect account abuse or breaches.

Article - Multi-Factor Authentication...

https://tuportal6.temple.edu/web/its/multi-factor-authentication

To better protect your personal information, Temple uses an extra level of security on selected websites called Multi-Factor Authentication (MFA) . It's called Multi-Factor Authentication because in order to access these sites, you will need: your AccessNet username and password one or more designated phones to further verify your identity Once you set up MFA, the next time you log in to a ...

COBIT 5 and GRC - Temple University

https://community.mis.temple.edu/mis5121sec701fall18/files/2018/12/COBIT5-and-GRC_ISACA.ppt

The COBIT 5 principles and enablers are generic and useful for enterprises of all sizes, whether commercial, not-for -profit or in the public sector. COBIT 5 Principles Source: COBIT® 5, figure 2. © 2012 ISACA® All rights reserved. COBIT 5 Enterprise Enablers Source: COBIT® 5, figure 12. © 2012 ISACA® All rights reserved.

Web Application Development - Department of Management Information ...

https://community.mis.temple.edu/mis2402sec004fall2025/schedule/

Schedule Any necessary updates to the schedule will be documented here. The FINAL EXAM will be held in Speakman 12 on Monday 12/15 at 3:30pm. ... * Last date to drop is 9/8 ** Last date to withdraw is 12/8 FINAL EXAM will be held in Speakman 12 on Monday 12/15 at 3:30pm.

Citrix Receiver/Online Plugin Troubleshooting - Sites

https://sites.temple.edu/servicedesk/files/2015/02/Citrix-USArmySetupInfo.pdf

Installing the Citrix Receiver (Admin rights are required) Navigate to: http://www.citrix.com/go/receiver.html Accept the terms and conditions and follow the instructions to download and install Citrix Receiver for Windows 4.1.2

Enabling Processes - Temple University

https://community.mis.temple.edu/mis5203sec951spring2022/files/2019/01/COBIT5-Ver2-enabling.pdf

In chapter 3, the COBIT 5 process model is explained and its components defined. This chapter explains what information is included in the detailed process information section.

CIS 3207 - Operating Systems

https://cis.temple.edu/~qzeng/cis3207-spring18/

Below is a schedule for this course, which will be updated as the course progresses. Students are thus required to frequently check this webpage for schedule, reading materials, and assignment updates.

Personalized Mobile Targeting with User Engagement Stages: Combining a ...

https://www.fox.temple.edu/sites/fox/files/SHMM_isre.2018.0831.pdf

Table 3 presents our main regression results for two groups of users: active users (i.e., users who had reading records for the pretreatment periods) and all users (both active and inactive users). Generally speaking, the two models returned qualitatively consistent re-sults.

Data and Analytics - Department of Management Information Systems ...

https://community.mis.temple.edu/mis2502sec003fall2025/

Data and Analytics MIS 2502.003 Fall 2025 Shuhua Wu

CIS587: The RETE Algorithm - Temple University

https://cis.temple.edu/~giorgio/cis587/readings/rete.html

RULE 1: RULE 2: (find-match ?x ?y ?z ?w) (item ?x) (item ?x) (item ?y) (item ?y) (item ?z) (item ?z) (item ?w) (item ?w) (find-match ?x ?y ?z ?w) =========> ... ==========> ... In both Rule 1 and 2 we have five alpha nodes and 4 beta nodes. Here is the storage for the nodes for Rule 1: