Template:Mobile Top 10 2016:SummaryTableHeaderBeginTemplate

From OWASP
Jump to: navigation, search

Usage:

English, style of 2016
 {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016}}  <!-- default: language = English, no image --->
 ...
 {{Mobile_Top_10_2016:SummaryTableEndTemplate}}
Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
Application Specific



German, style of 2016
 {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|language=de|year=2016}} <!-- language = de (German), default: no image --->
 ...
 {{Mobile_Top_10_2016:SummaryTableEndTemplate}}
Bedrohungsquelle Angriffsvektor Schwachstellen Technische Auswirkung Auswirkung auf das Unternehmen
Anwendungs-
spezifisch



English, style of 2016, with images
 {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images|year=2016}} 
 ...
 {{Mobile_Top_10_2016:SummaryTableEndTemplate}}
Threat Agents
Attack Vectors
Security Weakness
Technical Impacts
Business Impacts
Application Specific



German, style of 2016, with images
 {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images|language=de|year=2016}} 
 ...
 {{Mobile_Top_10_2016:SummaryTableEndTemplate}}
Bedrohungsquelle
Angriffsvektor
Schwachstellen
Technische Auswirkung
Auswirkung auf das Unternehmen
Anwendungs-
spezifisch



German, style of 2016, with images
 {{Mobile_Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|language=de}} <!-- default: style->year=2016 --->
 ...
 {{Mobile_Top_10_2016:SummaryTableEndTemplate}}
Bedrohungsquelle
Angriffsvektor
Schwachstellen
Technische Auswirkung
Auswirkung auf das Unternehmen
Anwendungs-
spezifisch



English, style of 2016, with images
 {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|type=images}} 
 ...
 {{Mobile_Top_10_2016:SummaryTableEndTemplate}}
Threat Agents
Attack Vectors
Security Weakness
Technical Impacts
Business Impacts
Application Specific



English, style of 2016 (default)
 {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate}}  <!-- default: language = English, style->year=2016, no image --->
 ...
 {{Mobile_Top_10_2016:SummaryTableEndTemplate}}
Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
Application Specific