This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Top 10 2010 Developer Edition De:SubsectionAdvancedTemplate"
From OWASP
m |
|||
Line 32: | Line 32: | ||
<td style="vertical-align: top; width: 50%; padding: 5px; border: 3px solid #4F81BD; background-color: #F2F2F2"> | <td style="vertical-align: top; width: 50%; padding: 5px; border: 3px solid #4F81BD; background-color: #F2F2F2"> | ||
}} | }} | ||
− | |||
<div style="font-style: bold; color: #4F81BD; font-size: 150%;">{{#switch: {{{number}}} | 1=Mögliche Angriffsszenarien | 2=Wie kann ich {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} verhindern? | 3=Verteidigungs-Option 1: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 4=Verteidigungs-Option 2: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 5=Verteidigungs-Option 3: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 6=Verteidigungs-Option: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 8=Referenzen |9=Referenzen}}</div> | <div style="font-style: bold; color: #4F81BD; font-size: 150%;">{{#switch: {{{number}}} | 1=Mögliche Angriffsszenarien | 2=Wie kann ich {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} verhindern? | 3=Verteidigungs-Option 1: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 4=Verteidigungs-Option 2: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 5=Verteidigungs-Option 3: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 6=Verteidigungs-Option: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 8=Referenzen |9=Referenzen}}</div> | ||
|<br/>{{Top_10_2010:SubsectionColoredTemplate|{{#switch: {{{number}}} | 1=Mögliche Angriffsszenarien | 2=Wie kann ich {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} verhindern? | 3=Verteidigungs-Option 1: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 4=Verteidigungs-Option 2: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 5=Verteidigungs-Option 3: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}}| 6=Verteidigungs-Option: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 8=Referenzen| 9=Referenzen}}|}} | |<br/>{{Top_10_2010:SubsectionColoredTemplate|{{#switch: {{{number}}} | 1=Mögliche Angriffsszenarien | 2=Wie kann ich {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} verhindern? | 3=Verteidigungs-Option 1: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 4=Verteidigungs-Option 2: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 5=Verteidigungs-Option 3: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}}| 6=Verteidigungs-Option: {{Top_10_2010_Developer_Edition_De:ByTheNumbers|{{{risk}}}}} | 8=Referenzen| 9=Referenzen}}|}} | ||
}} | }} |