This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "File:Data flow2.jpg"
From OWASP
Davidlowry (talk | contribs) (Example Data Flow Diagram for the College Library Website Example in Application Threat Modeling for the Code Review Guide.) |
(Added request for conversion to vector format.) |
||
| (One intermediate revision by the same user not shown) | |||
| Line 1: | Line 1: | ||
Example Data Flow Diagram for the College Library Website Example in Application Threat Modeling for the Code Review Guide. | Example Data Flow Diagram for the College Library Website Example in Application Threat Modeling for the Code Review Guide. | ||
| + | |||
| + | {{Convert to SVG|diagram}} | ||
Latest revision as of 16:11, 30 August 2010
Example Data Flow Diagram for the College Library Website Example in Application Threat Modeling for the Code Review Guide.
| This image is marked with the {{Convert to SVG}} template... |
|---|
...because it is provided in a raster format, which makes it difficult to:
|
The situation can be corrected as follows:
|
File history
Click on a date/time to view the file as it appeared at that time.
| Date/Time | Thumbnail | Dimensions | User | Comment | |
|---|---|---|---|---|---|
| current | 15:57, 30 August 2010 | 760 × 469 (42 KB) | Thomas Herlea (talk | contribs) | Typo: "Boundry" -> "Boundary" | |
| 21:09, 10 August 2008 | 760 × 469 (29 KB) | Davidlowry (talk | contribs) | Example Data Flow Diagram for the College Library Website Example in Application Threat Modeling for the Code Review Guide. |
- You cannot overwrite this file.
File usage
The following page links to this file: