vault backup: 2023-04-15 13:23:57
This commit is contained in:
38
.obsidian/workspace.json
vendored
38
.obsidian/workspace.json
vendored
@@ -8,12 +8,22 @@
|
|||||||
"type": "tabs",
|
"type": "tabs",
|
||||||
"children": [
|
"children": [
|
||||||
{
|
{
|
||||||
"id": "bbc5927e93be148a",
|
"id": "bd69cec7a0f30b48",
|
||||||
|
"type": "leaf",
|
||||||
|
"state": {
|
||||||
|
"type": "pdf",
|
||||||
|
"state": {
|
||||||
|
"file": "FH/Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "90d0b00747e29420",
|
||||||
"type": "leaf",
|
"type": "leaf",
|
||||||
"state": {
|
"state": {
|
||||||
"type": "markdown",
|
"type": "markdown",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "FH/Informationssicherheit/Ueb1/Ueb01.md",
|
"file": "FH/Informationssicherheit/Ueb2/Ueb2.md",
|
||||||
"mode": "source",
|
"mode": "source",
|
||||||
"source": false
|
"source": false
|
||||||
}
|
}
|
||||||
@@ -85,7 +95,7 @@
|
|||||||
"state": {
|
"state": {
|
||||||
"type": "backlink",
|
"type": "backlink",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "FH/Informationssicherheit/Ueb1/Ueb01.md",
|
"file": "FH/Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf",
|
||||||
"collapseAll": false,
|
"collapseAll": false,
|
||||||
"extraContext": false,
|
"extraContext": false,
|
||||||
"sortOrder": "alphabetical",
|
"sortOrder": "alphabetical",
|
||||||
@@ -102,7 +112,7 @@
|
|||||||
"state": {
|
"state": {
|
||||||
"type": "outgoing-link",
|
"type": "outgoing-link",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "FH/Informationssicherheit/Ueb1/Ueb01.md",
|
"file": "FH/Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf",
|
||||||
"linksCollapsed": false,
|
"linksCollapsed": false,
|
||||||
"unlinkedCollapsed": true
|
"unlinkedCollapsed": true
|
||||||
}
|
}
|
||||||
@@ -125,7 +135,7 @@
|
|||||||
"state": {
|
"state": {
|
||||||
"type": "outline",
|
"type": "outline",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "FH/Informationssicherheit/Ueb1/Ueb01.md"
|
"file": "FH/Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -133,7 +143,7 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"direction": "horizontal",
|
"direction": "horizontal",
|
||||||
"width": 300,
|
"width": 200,
|
||||||
"collapsed": true
|
"collapsed": true
|
||||||
},
|
},
|
||||||
"left-ribbon": {
|
"left-ribbon": {
|
||||||
@@ -146,11 +156,20 @@
|
|||||||
"command-palette:Open command palette": false
|
"command-palette:Open command palette": false
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"active": "bbc5927e93be148a",
|
"active": "bd69cec7a0f30b48",
|
||||||
"lastOpenFiles": [
|
"lastOpenFiles": [
|
||||||
"FH/Informationssicherheit/Ueb01.md",
|
"README.md",
|
||||||
|
"FH/Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf",
|
||||||
|
"FH/Informationssicherheit/Ueb2/Ueb2.md",
|
||||||
|
"FH/Informationssicherheit/Ueb1/01-ueb_uebungsblatt.pdf",
|
||||||
|
"FH/Informationssicherheit/VL/01-orga-motivation-handout.pdf",
|
||||||
|
"FH/Informationssicherheit/VL/02-terminologie-handout.pdf",
|
||||||
|
"FH/Informationssicherheit/VL/03-fm-orga-handout.pdf",
|
||||||
|
"FH/Informationssicherheit/VL",
|
||||||
"FH/Informationssicherheit/Ueb1/Ueb01.pdf",
|
"FH/Informationssicherheit/Ueb1/Ueb01.pdf",
|
||||||
|
"FH/Informationssicherheit/Ueb2",
|
||||||
"FH/Informationssicherheit/Ueb1/Ueb01.md",
|
"FH/Informationssicherheit/Ueb1/Ueb01.md",
|
||||||
|
"FH/Informationssicherheit/Ueb01.md",
|
||||||
"FH/Informationssicherheit/Ueb1/20230331_17h00m06s_grim.png",
|
"FH/Informationssicherheit/Ueb1/20230331_17h00m06s_grim.png",
|
||||||
"FH/Informationssicherheit/Ueb1/20230331_16h29m50s_grim.png",
|
"FH/Informationssicherheit/Ueb1/20230331_16h29m50s_grim.png",
|
||||||
"FH/Informationssicherheit/Ueb1/20230331_16h22m19s_grim.png",
|
"FH/Informationssicherheit/Ueb1/20230331_16h22m19s_grim.png",
|
||||||
@@ -164,9 +183,6 @@
|
|||||||
"FH/Informationssicherheit/Ueb1",
|
"FH/Informationssicherheit/Ueb1",
|
||||||
"FH/Informationssicherheit/Neuer Ordner",
|
"FH/Informationssicherheit/Neuer Ordner",
|
||||||
"FH/Algorithmen und Datenstrukturen/UEB01.md",
|
"FH/Algorithmen und Datenstrukturen/UEB01.md",
|
||||||
"FH/Algorithmen und Datenstrukturen",
|
|
||||||
"FH/Informationssicherheit/Ueb01.pdf",
|
|
||||||
"FH/Informationssicherheit",
|
|
||||||
"FH/CCN/VL01.md"
|
"FH/CCN/VL01.md"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
BIN
FH/Informationssicherheit/Ueb1/01-ueb_uebungsblatt.pdf
Normal file
BIN
FH/Informationssicherheit/Ueb1/01-ueb_uebungsblatt.pdf
Normal file
Binary file not shown.
BIN
FH/Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf
Normal file
BIN
FH/Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf
Normal file
Binary file not shown.
0
FH/Informationssicherheit/Ueb2/Ueb2.md
Normal file
0
FH/Informationssicherheit/Ueb2/Ueb2.md
Normal file
BIN
FH/Informationssicherheit/VL/01-orga-motivation-handout.pdf
Normal file
BIN
FH/Informationssicherheit/VL/01-orga-motivation-handout.pdf
Normal file
Binary file not shown.
BIN
FH/Informationssicherheit/VL/02-terminologie-handout.pdf
Normal file
BIN
FH/Informationssicherheit/VL/02-terminologie-handout.pdf
Normal file
Binary file not shown.
BIN
FH/Informationssicherheit/VL/03-fm-orga-handout.pdf
Normal file
BIN
FH/Informationssicherheit/VL/03-fm-orga-handout.pdf
Normal file
Binary file not shown.
Reference in New Issue
Block a user