Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 3,740

REDCap [College of Public Health] - Temple University

https://cphapps.temple.edu/wiki/it/apps/redcap

REDCap REDCap is a secure web application for building and managing online surveys and databases. While REDCap can be used to collect virtually any type of data in any environment (including compliance with 21 CFR Part 11, FISMA, HIPAA, and GDPR), it is specifically geared to support online and offline data capture for research studies and operations. Access REDCap Join the REDCap Community on ...

Application Development Technology and Tools: Vulnerabilities and ...

https://community.mis.temple.edu/mis5206sec701fall2024/files/2020/08/SANS-Reading7_application-development-technology-tools-vulnerabilities-threat-management-secure-programming-practices-defense-in-depth-approach-1283.pdf

This paper addresses the security challenges that exist due to programming flaws, and explains how simple programming practices can reduce the risks. The paper starts with a description of common application vulnerabilities and risks. The vulnerabilities that are discussed include Buffer overflows, SQL Injection, Script Injection, XML injection and others. The application development platforms ...

CARE Lab: Cybersecurity in Application, Research & Education ... - Sites

https://sites.temple.edu/care/

Cyberspace is fundamental to our national prosperity, as it is critical to economy, government, and day-to-day societal functioning. The Cybersecurity in Application, Research, and Education (CARE) Lab offers a social science approach to cybersecurity and seeks to foster a multidisciplinary dialog among academia, industry, nonprofits, and government. This intersectionality enables a creative ...

Phishing | Information Technology Services | Temple University ...

https://its.temple.edu/stay-secure/phishing

Phishing scams are sophisticated messages, typically emails, that appear to come from legitimate organizations (i.e. the university, your bank, Amazon, etc.), which are attempting to obtain your personal information (i.e. your password, account number, credit card, etc.). The message may ask you to respond with your personal information or include a link to a fraudulent website. Often, the ...

Enabling Processes - Temple University

https://community.mis.temple.edu/mis5203sec951spring2022/files/2019/01/COBIT5-Ver2-enabling.pdf

Disclaimer ISACA has designed this publication, COBIT® 5: Enabling Processes (the ‘Work’), primarily as an educational resource for governance of enterprise IT (GEIT), assurance, risk and security professionals. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or ...

IT Auditing & Cyber Security - Fox School of Business

https://www.fox.temple.edu/campaign/landing-page/it-auditing-and-cyber-security/

Secure Your Success Master the skills to identify, assess and control cyber security risks with the Master of Science in Information Technology Auditing & Cyber Security. Ensure robust information systems security and regulatory compliance within organizations while effectively mitigating the risks to the confidentiality, integrity and availability of critical information. Fast Facts: Complete ...

1057-CH01 - Temple University

https://cis.temple.edu/~wangp/1057-PC/Lecture/Ch01.htm

The translation from high-level languages and assembly languages into machine languages is accomplished by special programs: compilers, interpreters, and assemblers. A compiler translates a source program in a high-level language into an object program in the machine language. An interpreter interprets and executes a program in a high-level language line by line. An assembler translates a ...

Temple University - MISDEMO

https://misdemo.temple.edu/

This server is used for instructional purposes only. It is used by the MIS Department in the Fox School of Business, at Temple University.

Data and Analytics (Section 1) - INSTRUCTOR: JAEHWUEN JUNG

https://community.mis.temple.edu/mis2502sec001fall2025/

The exam is a closed book, closed notes. The exam will be a combination of multiple-choice and short-answer questions. Exam # 1 covers all the lectures up to “SQL 2: Getting Information Out of a Database – Advanced Queries”. We will have a review session on 9/23. Study Guide for Exam #1 (word) Study Guide for Exam #1 (ppt) Here are some practice questions, in case you want more exercise ...

2025-2026 Academic Calendar | Office of the University Registrar ...

https://registrar.temple.edu/2025-2026-academic-calendar

Religious, cultural and federal observances dates Dates may be subject to change. Updated on September 29, 2025.