This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "File:Data flow1.jpg"
From OWASP
(uploaded a new version of "File:Data flow1.jpg": Typo: "Boundry" -> "Boundary") |
(Added request for conversion to vector format.) |
||
| Line 1: | Line 1: | ||
Example data flow diagram for Application Threat Modeling in Code Review guide. | Example data flow diagram for Application Threat Modeling in Code Review guide. | ||
| + | |||
| + | {{Convert to SVG|diagram}} | ||
Latest revision as of 15:54, 30 August 2010
Example data flow diagram for Application Threat Modeling in Code Review guide.
| This image is marked with the {{Convert to SVG}} template... |
|---|
...because it is provided in a raster format, which makes it difficult to:
|
The situation can be corrected as follows:
|
File history
Click on a date/time to view the file as it appeared at that time.
| Date/Time | Thumbnail | Dimensions | User | Comment | |
|---|---|---|---|---|---|
| current | 15:28, 30 August 2010 | 749 × 412 (39 KB) | Thomas Herlea (talk | contribs) | Typo: "Boundry" -> "Boundary" | |
| 20:52, 10 August 2008 | 749 × 412 (27 KB) | Davidlowry (talk | contribs) | Example data flow diagram for Application Threat Modeling in Code Review guide. |
- You cannot overwrite this file.
File usage
The following page links to this file: