{ "main": { "id": "1345ce316d57bf13", "type": "split", "children": [ { "id": "e403734ae4b6cb9c", "type": "tabs", "children": [ { "id": "d668440913b05378", "type": "leaf", "state": { "type": "pdf", "state": { "file": "Informationssicherheit/Ilias/Vorlesungen/10-sichere-software-entwicklung-handout.pdf" } } }, { "id": "37fb4be3bf0d3154", "type": "leaf", "state": { "type": "pdf", "state": { "file": "Algorithmen und Datenstrukturen/Ilias/VL10 - Sortieren 2/VL10-Sortieren_2.pdf" } } }, { "id": "0fd4f7bfbf2ab7da", "type": "leaf", "state": { "type": "pdf", "state": { "file": "Algorithmen und Datenstrukturen/Ilias/Alte Klausuren/39-Klausur vom 08.02.2023_final.pdf" } } }, { "id": "7a651a23dd98eda7", "type": "leaf", "state": { "type": "pdf", "state": { "file": "CCN/Ilias/Lecture/CCN-6 - ApplicationLayer.pdf" } } } ], "currentTab": 2 } ], "direction": "vertical" }, "left": { "id": "e5fbdfc2085faa4b", "type": "split", "children": [ { "id": "e02674fc64edf0b5", "type": "tabs", "children": [ { "id": "b8336cb3c3d06be9", "type": "leaf", "state": { "type": "file-explorer", "state": { "sortOrder": "alphabetical" } } }, { "id": "14611a26bf336471", "type": "leaf", "state": { "type": "search", "state": { "query": "", "matchingCase": false, "explainSearch": false, "collapseAll": false, "extraContext": false, "sortOrder": "alphabetical" } } }, { "id": "344d14435301d3da", "type": "leaf", "state": { "type": "starred", "state": {} } }, { "id": "50de9879caa2f002", "type": "leaf", "state": { "type": "bookmarks", "state": {} } } ] } ], "direction": "horizontal", "width": 300 }, "right": { "id": "70ae06261ef3fc74", "type": "split", "children": [ { "id": "07672eb406645795", "type": "tabs", "children": [ { "id": "827e4aecb1891b44", "type": "leaf", "state": { "type": "backlink", "state": { "file": "Algorithmen und Datenstrukturen/Ilias/Alte Klausuren/39-Klausur vom 08.02.2023_final.pdf", "collapseAll": false, "extraContext": false, "sortOrder": "alphabetical", "showSearch": false, "searchQuery": "", "backlinkCollapsed": false, "unlinkedCollapsed": true } } }, { "id": "583573a993e5af09", "type": "leaf", "state": { "type": "outgoing-link", "state": { "file": "Algorithmen und Datenstrukturen/Ilias/Alte Klausuren/39-Klausur vom 08.02.2023_final.pdf", "linksCollapsed": false, "unlinkedCollapsed": true } } }, { "id": "fbf143571343fb20", "type": "leaf", "state": { "type": "tag", "state": { "sortOrder": "frequency", "useHierarchy": true } } }, { "id": "457947aad2c5e591", "type": "leaf", "state": { "type": "outline", "state": { "file": "Algorithmen und Datenstrukturen/Ilias/Alte Klausuren/39-Klausur vom 08.02.2023_final.pdf" } } }, { "id": "631d374a04a792db", "type": "leaf", "state": { "type": "advanced-tables-toolbar", "state": {} } }, { "id": "b3aa4e2b20626da4", "type": "leaf", "state": { "type": "calendar", "state": {} } }, { "id": "c3c39c68e6060e3e", "type": "leaf", "state": { "type": "juggl_nodes", "state": {} } }, { "id": "ccdfcdb588345764", "type": "leaf", "state": { "type": "juggl_style", "state": {} } } ], "currentTab": 4 } ], "direction": "horizontal", "width": 200, "collapsed": true }, "left-ribbon": { "hiddenItems": { "switcher:Open quick switcher": false, "graph:Open graph view": false, "canvas:Create new canvas": false, "daily-notes:Open today's daily note": false, "templates:Insert template": false, "command-palette:Open command palette": false, "table-editor-obsidian:Advanced Tables Toolbar": false, "obsidian-advanced-slides:Show Slide Preview": false, "juggl:Juggl global graph": false, "obsidian-livesync:Replicate": false, "obsidian-livesync:Show log": false, "obsidian-excalidraw-plugin:Create new drawing": false, "obsidian-wordnet-plugin:WordNet Dictionary": false } }, "active": "0fd4f7bfbf2ab7da", "lastOpenFiles": [ "Algorithmen und Datenstrukturen/Ilias/VL10 - Sortieren 2/VL10-Sortieren_2.pdf", "Algorithmen und Datenstrukturen/Ilias/VL03 - Listen/VL03-Listen.pdf", "Algorithmen und Datenstrukturen/Ilias/Alte Klausuren/39-Klausur vom 08.02.2023_final.pdf", "CCN/Ilias/Lecture/CCN-6 - ApplicationLayer.pdf", "Algorithmen und Datenstrukturen/Ilias/VL01 - Algorithmen/VL01-Algorithmen.pdf", "Algorithmen und Datenstrukturen/Ilias/VL03 - Listen/UEB03.pdf", "Algorithmen und Datenstrukturen/Ilias/VL02 - Komplexität/UEB02.pdf", "Algorithmen und Datenstrukturen/Ilias/VL02 - Komplexität/VL02-Komplexitaet.pdf", "Algorithmen und Datenstrukturen/Ilias/VL01 - Algorithmen/UEB01.pdf", "Algorithmen und Datenstrukturen/Ilias/VL12 - Graphen 1/VL12-Graphen_1.pdf", "Informationssicherheit/Ilias/Vorlesungen/10-sichere-software-entwicklung-handout.pdf", "Informationssicherheit/Ueb9/UEB_09.md", "English/KW26.md", "Informationssicherheit/Ueb7/Ueb07.md", "Informationssicherheit/UEB8/UEB08.md", "Informationssicherheit/Ueb6/Ueb 6.md", "English/KW21.md", "Informationssicherheit/Ueb5/new UEB5.md", "Informationssicherheit/Ueb5/Ueb5.md", "Informationssicherheit/Ueb4/Ueb4.md", "Mathe/KW20/KW20.md", "Informationssicherheit/Ueb4/Ueb4 - Kopie.md", "Algorithmen und Datenstrukturen/VL/VL06/VL07.md", "English/KW18.md", "Mathe/KW17/KW17.md", "Mathe/KW20.md", "Algorithmen und Datenstrukturen/UEB04/UEB4.md", "Informationssicherheit/Ueb3/Ueb3.md", "English/KW17.md", "Untitled Diagram.svg", "conflict-files-obsidian-git.md", "CCN/Ex02/Exercise 2.md", "CCN/Untitled.md", "unterwäsche_austausch_nein.jpg.md", "Informationssicherheit/Ueb2/Ueb2.md", "CCN/VL01.md", "Mathe/KW16/UEB.md", "CCN/Ex01/2023-04-18_11-08.png", "Informationssicherheit/Ueb2/2023-04-17_15-55.png", "Informationssicherheit/Ueb2/2023-04-17_14-16.png", "Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png", "Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png", "Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png", "Informationssicherheit/Ueb1/20230331_10h28m24s_grim.png", "Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png", "Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png" ] }