Skip to content

Commit 4e872bd

Browse files
committed
add logo to sub-sections ToC
1 parent f5e24f0 commit 4e872bd

File tree

15 files changed

+169
-1
lines changed

15 files changed

+169
-1
lines changed

draft/06-design/01-threat-modeling/toc.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,18 @@ permalink: /draft/design/threat_modeling/
1212

1313
{% include breadcrumb.html %}
1414

15+
<style type="text/css">
16+
.image-right {
17+
height: 180px;
18+
display: block;
19+
margin-left: auto;
20+
margin-right: auto;
21+
float: right;
22+
}
23+
</style>
24+
25+
![Developer Guide](../../../../assets/images/dg_logo_bbd.png "OWASP Developer Guide"){: .image-right }
26+
1527
### 4.1 Threat modeling
1628

1729
Referring to the [Threat Modeling Cheat Sheet][tmcs],

draft/06-design/02-web-app-checklist/toc.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,18 @@ permalink: /draft/design/web_app_checklist/
1212

1313
{% include breadcrumb.html %}
1414

15+
<style type="text/css">
16+
.image-right {
17+
height: 180px;
18+
display: block;
19+
margin-left: auto;
20+
margin-right: auto;
21+
float: right;
22+
}
23+
</style>
24+
25+
![Developer Guide](../../../../assets/images/dg_logo_bbd.png "OWASP Developer Guide"){: .image-right }
26+
1527
### 4.2 Web application checklist
1628

1729
Checklists are a valuable resource for development teams.

draft/07-implementation/01-documentation/toc.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,18 @@ permalink: /draft/implementation/documentation/
1212

1313
{% include breadcrumb.html %}
1414

15+
<style type="text/css">
16+
.image-right {
17+
height: 180px;
18+
display: block;
19+
margin-left: auto;
20+
margin-right: auto;
21+
float: right;
22+
}
23+
</style>
24+
25+
![Developer Guide](../../../../assets/images/dg_logo_bbd.png "OWASP Developer Guide"){: .image-right }
26+
1527
### 5.1 Documentation
1628

1729
Documentation is used here as part of the SAMM [Training and Awareness][sammgegta] activity,

draft/07-implementation/02-dependencies/toc.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,18 @@ permalink: /draft/implementation/dependencies/
1212

1313
{% include breadcrumb.html %}
1414

15+
<style type="text/css">
16+
.image-right {
17+
height: 180px;
18+
display: block;
19+
margin-left: auto;
20+
margin-right: auto;
21+
float: right;
22+
}
23+
</style>
24+
25+
![Developer Guide](../../../../assets/images/dg_logo_bbd.png "OWASP Developer Guide"){: .image-right }
26+
1527
### 5.2 Dependencies
1628

1729
Management of software dependencies is described by the SAMM [Software Dependencies][sammisbsd] activity,

draft/07-implementation/03-secure-libraries/toc.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,18 @@ permalink: /draft/implementation/secure_libraries/
1212

1313
{% include breadcrumb.html %}
1414

15+
<style type="text/css">
16+
.image-right {
17+
height: 180px;
18+
display: block;
19+
margin-left: auto;
20+
margin-right: auto;
21+
float: right;
22+
}
23+
</style>
24+
25+
![Developer Guide](../../../../assets/images/dg_logo_bbd.png "OWASP Developer Guide"){: .image-right }
26+
1527
### 5.3 Secure libraries
1628

1729
The use of secure libraries is part of the technology management that helps to fulfil security requirements.

draft/07-implementation/04-dos-donts/toc.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,18 @@ permalink: /draft/implementation/dos_donts/
1212

1313
{% include breadcrumb.html %}
1414

15+
<style type="text/css">
16+
.image-right {
17+
height: 180px;
18+
display: block;
19+
margin-left: auto;
20+
margin-right: auto;
21+
float: right;
22+
}
23+
</style>
24+
25+
![Developer Guide](../../../../assets/images/dg_logo_bbd.png "OWASP Developer Guide"){: .image-right }
26+
1527
### 5.4 Implementation Do's and Don'ts
1628

1729
Implementation demands technical knowledge, skill and experience.

draft/08-verification/01-guides/toc.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,18 @@ permalink: /draft/verification/guides/
1212

1313
{% include breadcrumb.html %}
1414

15+
<style type="text/css">
16+
.image-right {
17+
height: 180px;
18+
display: block;
19+
margin-left: auto;
20+
margin-right: auto;
21+
float: right;
22+
}
23+
</style>
24+
25+
![Developer Guide](../../../../assets/images/dg_logo_bbd.png "OWASP Developer Guide"){: .image-right }
26+
1527
### 6.1 Verification guides
1628

1729
[Verification][sammv] is one of the business functions described by the [OWASP SAMM][samm].

draft/08-verification/02-tools/toc.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,18 @@ permalink: /draft/verification/tools/
1212

1313
{% include breadcrumb.html %}
1414

15+
<style type="text/css">
16+
.image-right {
17+
height: 180px;
18+
display: block;
19+
margin-left: auto;
20+
margin-right: auto;
21+
float: right;
22+
}
23+
</style>
24+
25+
![Developer Guide](../../../../assets/images/dg_logo_bbd.png "OWASP Developer Guide"){: .image-right }
26+
1527
### 6.2 Verification tools
1628

1729
[Verification][sammv] is one of the business functions described by the [OWASP SAMM][samm].

draft/08-verification/03-frameworks/toc.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,18 @@ permalink: /draft/verification/frameworks/
1212

1313
{% include breadcrumb.html %}
1414

15+
<style type="text/css">
16+
.image-right {
17+
height: 180px;
18+
display: block;
19+
margin-left: auto;
20+
margin-right: auto;
21+
float: right;
22+
}
23+
</style>
24+
25+
![Developer Guide](../../../../assets/images/dg_logo_bbd.png "OWASP Developer Guide"){: .image-right }
26+
1527
### 6.3 Verification frameworks
1628

1729
[Verification][sammv] is one of the business functions described by the [OWASP SAMM][samm]

draft/08-verification/04-vulnerability-management/toc.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,18 @@ permalink: /draft/verification/vulnerability_management/
1212

1313
{% include breadcrumb.html %}
1414

15+
<style type="text/css">
16+
.image-right {
17+
height: 180px;
18+
display: block;
19+
margin-left: auto;
20+
margin-right: auto;
21+
float: right;
22+
}
23+
</style>
24+
25+
![Developer Guide](../../../../assets/images/dg_logo_bbd.png "OWASP Developer Guide"){: .image-right }
26+
1527
### 6.4 Verification vulnerability management
1628

1729
[Verification][sammv] is one of the business functions described by the [OWASP SAMM][samm].

0 commit comments

Comments
 (0)