This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "File:Data flow2.jpg"
From OWASP
Davidlowry (talk | contribs) (Example Data Flow Diagram for the College Library Website Example in Application Threat Modeling for the Code Review Guide.) |
(uploaded a new version of "File:Data flow2.jpg": Typo: "Boundry" -> "Boundary") |
(No difference)
|
Revision as of 15:57, 30 August 2010
Example Data Flow Diagram for the College Library Website Example in Application Threat Modeling for the Code Review Guide.
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 15:57, 30 August 2010 | 760 × 469 (42 KB) | Thomas Herlea (talk | contribs) | Typo: "Boundry" -> "Boundary" | |
21:09, 10 August 2008 | 760 × 469 (29 KB) | Davidlowry (talk | contribs) | Example Data Flow Diagram for the College Library Website Example in Application Threat Modeling for the Code Review Guide. |
- You cannot overwrite this file.
File usage
The following page links to this file: