This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "File:Data flow1.jpg"
From OWASP
Davidlowry (talk | contribs) (Example data flow diagram for Application Threat Modeling in Code Review guide.) |
(Added request for conversion to vector format.) |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
Example data flow diagram for Application Threat Modeling in Code Review guide. | Example data flow diagram for Application Threat Modeling in Code Review guide. | ||
+ | |||
+ | {{Convert to SVG|diagram}} |
Latest revision as of 15:54, 30 August 2010
Example data flow diagram for Application Threat Modeling in Code Review guide.
This image is marked with the {{Convert to SVG}} template... |
---|
...because it is provided in a raster format, which makes it difficult to:
|
The situation can be corrected as follows:
|
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 15:28, 30 August 2010 | 749 × 412 (39 KB) | Thomas Herlea (talk | contribs) | Typo: "Boundry" -> "Boundary" | |
20:52, 10 August 2008 | 749 × 412 (27 KB) | Davidlowry (talk | contribs) | Example data flow diagram for Application Threat Modeling in Code Review guide. |
- You cannot overwrite this file.
File usage
The following page links to this file: