{ "main": { "id": "1345ce316d57bf13", "type": "split", "children": [ { "id": "08ad9b53ade42d31", "type": "tabs", "children": [ { "id": "bd69cec7a0f30b48", "type": "leaf", "state": { "type": "pdf", "state": { "file": "FH/Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf" } } }, { "id": "90d0b00747e29420", "type": "leaf", "state": { "type": "markdown", "state": { "file": "FH/Informationssicherheit/Ueb2/Ueb2.md", "mode": "source", "source": false } } } ] } ], "direction": "vertical" }, "left": { "id": "e5fbdfc2085faa4b", "type": "split", "children": [ { "id": "e02674fc64edf0b5", "type": "tabs", "children": [ { "id": "b8336cb3c3d06be9", "type": "leaf", "state": { "type": "file-explorer", "state": { "sortOrder": "alphabetical" } } }, { "id": "14611a26bf336471", "type": "leaf", "state": { "type": "search", "state": { "query": "", "matchingCase": false, "explainSearch": false, "collapseAll": false, "extraContext": false, "sortOrder": "alphabetical" } } }, { "id": "344d14435301d3da", "type": "leaf", "state": { "type": "starred", "state": {} } } ] } ], "direction": "horizontal", "width": 300 }, "right": { "id": "70ae06261ef3fc74", "type": "split", "children": [ { "id": "07672eb406645795", "type": "tabs", "children": [ { "id": "827e4aecb1891b44", "type": "leaf", "state": { "type": "backlink", "state": { "file": "FH/Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf", "collapseAll": false, "extraContext": false, "sortOrder": "alphabetical", "showSearch": false, "searchQuery": "", "backlinkCollapsed": false, "unlinkedCollapsed": true } } }, { "id": "583573a993e5af09", "type": "leaf", "state": { "type": "outgoing-link", "state": { "file": "FH/Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf", "linksCollapsed": false, "unlinkedCollapsed": true } } }, { "id": "fbf143571343fb20", "type": "leaf", "state": { "type": "tag", "state": { "sortOrder": "frequency", "useHierarchy": true } } }, { "id": "457947aad2c5e591", "type": "leaf", "state": { "type": "outline", "state": { "file": "FH/Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf" } } } ] } ], "direction": "horizontal", "width": 200, "collapsed": true }, "left-ribbon": { "hiddenItems": { "switcher:Open quick switcher": false, "graph:Open graph view": false, "canvas:Create new canvas": false, "daily-notes:Open today's daily note": false, "templates:Insert template": false, "command-palette:Open command palette": false } }, "active": "bd69cec7a0f30b48", "lastOpenFiles": [ "README.md", "FH/Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf", "FH/Informationssicherheit/Ueb2/Ueb2.md", "FH/Informationssicherheit/Ueb1/01-ueb_uebungsblatt.pdf", "FH/Informationssicherheit/VL/01-orga-motivation-handout.pdf", "FH/Informationssicherheit/VL/02-terminologie-handout.pdf", "FH/Informationssicherheit/VL/03-fm-orga-handout.pdf", "FH/Informationssicherheit/VL", "FH/Informationssicherheit/Ueb1/Ueb01.pdf", "FH/Informationssicherheit/Ueb2", "FH/Informationssicherheit/Ueb1/Ueb01.md", "FH/Informationssicherheit/Ueb01.md", "FH/Informationssicherheit/Ueb1/20230331_17h00m06s_grim.png", "FH/Informationssicherheit/Ueb1/20230331_16h29m50s_grim.png", "FH/Informationssicherheit/Ueb1/20230331_16h22m19s_grim.png", "FH/Informationssicherheit/Ueb1/20230331_16h21m51s_grim.png", "FH/Informationssicherheit/Ueb1/20230331_16h17m48s_grim.png", "FH/Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png", "FH/Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png", "FH/Informationssicherheit/Ueb1/20230331_10h28m24s_grim.png", "FH/Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png", "FH/Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png", "FH/Informationssicherheit/Ueb1", "FH/Informationssicherheit/Neuer Ordner", "FH/Algorithmen und Datenstrukturen/UEB01.md", "FH/CCN/VL01.md" ] }