vault backup: 2023-07-22 16:57:24
This commit is contained in:
18567
.obsidian/plugins/obsidian-completr/scanned_words.txt
vendored
18567
.obsidian/plugins/obsidian-completr/scanned_words.txt
vendored
File diff suppressed because it is too large
Load Diff
108
.obsidian/workspace.json
vendored
108
.obsidian/workspace.json
vendored
@@ -154,9 +154,89 @@
|
||||
"type": "empty",
|
||||
"state": {}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "a2ba4308606a2eec",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "CCN/Ilias/Lecture/CCN-1 - introduction.pdf"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "586396335d50701a",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "CCN/Ilias/Lecture/CCN-2-PhysicalLayer.pdf"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "263585e27f75a102",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "CCN/Ilias/Lecture/CCN-3 - DataLinkLayer.pdf"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "06540c146a59a5ac",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "CCN/Ilias/Lecture/CCN-4 - NetworkLayer.pdf"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "6e558839a0a481b6",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "CCN/Ilias/Lecture/CCN-5 - TransportLayer.pdf"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "fb3ae404c1e9d043",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "CCN/Ilias/Lecture/CCN-6 - ApplicationLayer.pdf"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "951822e8383e6de9",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "CCN/Ilias/Lecture/CCN-7 - Wireless.pdf"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "09ab13255aade55b",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "CCN/Ilias/Lecture/CCN-8 - ExamPrep.pdf"
|
||||
}
|
||||
}
|
||||
}
|
||||
],
|
||||
"currentTab": 14
|
||||
"currentTab": 21
|
||||
}
|
||||
],
|
||||
"direction": "vertical"
|
||||
@@ -230,7 +310,7 @@
|
||||
"state": {
|
||||
"type": "backlink",
|
||||
"state": {
|
||||
"file": "Mathe/Ilias/KW13-Kompl1.pdf",
|
||||
"file": "CCN/Ilias/Lecture/CCN-7 - Wireless.pdf",
|
||||
"collapseAll": false,
|
||||
"extraContext": false,
|
||||
"sortOrder": "alphabetical",
|
||||
@@ -247,7 +327,7 @@
|
||||
"state": {
|
||||
"type": "outgoing-link",
|
||||
"state": {
|
||||
"file": "Mathe/Ilias/KW13-Kompl1.pdf",
|
||||
"file": "CCN/Ilias/Lecture/CCN-7 - Wireless.pdf",
|
||||
"linksCollapsed": false,
|
||||
"unlinkedCollapsed": true
|
||||
}
|
||||
@@ -270,7 +350,7 @@
|
||||
"state": {
|
||||
"type": "outline",
|
||||
"state": {
|
||||
"file": "Mathe/Ilias/KW13-Kompl1.pdf"
|
||||
"file": "CCN/Ilias/Lecture/CCN-7 - Wireless.pdf"
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -331,20 +411,21 @@
|
||||
"obsidian-wordnet-plugin:WordNet Dictionary": false
|
||||
}
|
||||
},
|
||||
"active": "b8336cb3c3d06be9",
|
||||
"active": "951822e8383e6de9",
|
||||
"lastOpenFiles": [
|
||||
"CCN/Ilias/Lecture/CCN-6 - ApplicationLayer.pdf",
|
||||
"CCN/Ilias/Lecture/CCN-5 - TransportLayer.pdf",
|
||||
"CCN/Ilias/Lecture/CCN-4 - NetworkLayer.pdf",
|
||||
"CCN/Ilias/Lecture/CCN-3 - DataLinkLayer.pdf",
|
||||
"CCN/Ilias/Lecture/CCN-2-PhysicalLayer.pdf",
|
||||
"CCN/Ilias/Lecture/CCN-1 - introduction.pdf",
|
||||
"CCN/Ilias/Lecture/CCN-8 - ExamPrep.pdf",
|
||||
"CCN/Ilias/Lecture/CCN-7 - Wireless.pdf",
|
||||
"Mathe/Ilias/KW13-Kompl1.pdf",
|
||||
"Informationssicherheit/Ueb9/UEB_09.md",
|
||||
"English/KW26.md",
|
||||
"Informationssicherheit/Ueb9/UEB_09.pdf",
|
||||
"Informationssicherheit/Ueb9",
|
||||
"Mathe/Ilias/KW26-IntFk2.pdf",
|
||||
"Mathe/Ilias/KW25-IntFk1.pdf",
|
||||
"Mathe/Ilias/KW24-DifFk2.pdf",
|
||||
"Mathe/Ilias/KW23-DifFk1.pdf",
|
||||
"Mathe/Ilias/KW22-klaumfi2_20230214.pdf.pdf",
|
||||
"Mathe/Ilias/KW17-GeoTra.pdf",
|
||||
"Mathe/Ilias/KW21-FolRei.pdf",
|
||||
"Mathe/Ilias/KW20-VekRau.pdf",
|
||||
"Informationssicherheit/Ueb7/Ueb07.md",
|
||||
"Informationssicherheit/UEB8/UEB08.md",
|
||||
"Informationssicherheit/Ueb6/Ueb 6.md",
|
||||
@@ -369,7 +450,6 @@
|
||||
"Informationssicherheit/Ueb2/Ueb2.md",
|
||||
"CCN/VL01.md",
|
||||
"Mathe/KW16/UEB.md",
|
||||
"CCN/Ex01/Exercise 1.md",
|
||||
"CCN/Ex01/2023-04-18_11-08.png",
|
||||
"Informationssicherheit/Ueb2/2023-04-17_15-55.png",
|
||||
"Informationssicherheit/Ueb2/2023-04-17_14-16.png",
|
||||
|
||||
Binary file not shown.
Binary file not shown.
BIN
Informationssicherheit/Ilias/Vorlesungen/03-fm-orga-handout.pdf
Normal file
BIN
Informationssicherheit/Ilias/Vorlesungen/03-fm-orga-handout.pdf
Normal file
Binary file not shown.
Binary file not shown.
Binary file not shown.
BIN
Informationssicherheit/Ilias/Vorlesungen/06-hash-mac-handout.pdf
Normal file
BIN
Informationssicherheit/Ilias/Vorlesungen/06-hash-mac-handout.pdf
Normal file
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
BIN
Informationssicherheit/Ilias/Vorlesungen/medinf-handout.pdf
Normal file
BIN
Informationssicherheit/Ilias/Vorlesungen/medinf-handout.pdf
Normal file
Binary file not shown.
BIN
Informationssicherheit/Ilias/ueb/01-ueb_uebungsblatt.pdf
Normal file
BIN
Informationssicherheit/Ilias/ueb/01-ueb_uebungsblatt.pdf
Normal file
Binary file not shown.
BIN
Informationssicherheit/Ilias/ueb/02-ueb_uebungsblatt.pdf
Normal file
BIN
Informationssicherheit/Ilias/ueb/02-ueb_uebungsblatt.pdf
Normal file
Binary file not shown.
BIN
Informationssicherheit/Ilias/ueb/03-ueb_uebungsblatt.pdf
Normal file
BIN
Informationssicherheit/Ilias/ueb/03-ueb_uebungsblatt.pdf
Normal file
Binary file not shown.
BIN
Informationssicherheit/Ilias/ueb/04-ueb_uebungsblatt.pdf
Normal file
BIN
Informationssicherheit/Ilias/ueb/04-ueb_uebungsblatt.pdf
Normal file
Binary file not shown.
BIN
Informationssicherheit/Ilias/ueb/05-ueb_uebungsblatt(1).pdf
Normal file
BIN
Informationssicherheit/Ilias/ueb/05-ueb_uebungsblatt(1).pdf
Normal file
Binary file not shown.
BIN
Informationssicherheit/Ilias/ueb/06-ueb_uebungsblatt.pdf
Normal file
BIN
Informationssicherheit/Ilias/ueb/06-ueb_uebungsblatt.pdf
Normal file
Binary file not shown.
BIN
Informationssicherheit/Ilias/ueb/07-ueb_uebungsblatt.pdf
Normal file
BIN
Informationssicherheit/Ilias/ueb/07-ueb_uebungsblatt.pdf
Normal file
Binary file not shown.
BIN
Informationssicherheit/Ilias/ueb/08-ueb_uebungsblatt.pdf
Normal file
BIN
Informationssicherheit/Ilias/ueb/08-ueb_uebungsblatt.pdf
Normal file
Binary file not shown.
BIN
Informationssicherheit/Ilias/ueb/09-ueb_uebungsblatt.pdf
Normal file
BIN
Informationssicherheit/Ilias/ueb/09-ueb_uebungsblatt.pdf
Normal file
Binary file not shown.
BIN
Informationssicherheit/Ilias/ueb/10-ueb_uebungsblatt.pdf
Normal file
BIN
Informationssicherheit/Ilias/ueb/10-ueb_uebungsblatt.pdf
Normal file
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
BIN
Informationssicherheit/Ilias/ueb/medinf-ueb_uebungsblatt.pdf
Normal file
BIN
Informationssicherheit/Ilias/ueb/medinf-ueb_uebungsblatt.pdf
Normal file
Binary file not shown.
Reference in New Issue
Block a user