{ "main": { "id": "1345ce316d57bf13", "type": "split", "children": [ { "id": "08ad9b53ade42d31", "type": "tabs", "dimension": 62.59025270758123, "children": [ { "id": "e2194e3299515374", "type": "leaf", "state": { "type": "markdown", "state": { "file": "CCN/VL01.md", "mode": "source", "source": false } } } ] }, { "id": "47553fa673bb1eb6", "type": "tabs", "dimension": 37.40974729241877, "children": [ { "id": "20668ba691cd80b3", "type": "leaf", "state": { "type": "pdf", "state": { "file": "Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf" } } } ] } ], "direction": "vertical" }, "left": { "id": "e5fbdfc2085faa4b", "type": "split", "children": [ { "id": "e02674fc64edf0b5", "type": "tabs", "children": [ { "id": "b8336cb3c3d06be9", "type": "leaf", "state": { "type": "file-explorer", "state": { "sortOrder": "alphabetical" } } }, { "id": "14611a26bf336471", "type": "leaf", "state": { "type": "search", "state": { "query": "", "matchingCase": false, "explainSearch": false, "collapseAll": false, "extraContext": false, "sortOrder": "alphabetical" } } }, { "id": "344d14435301d3da", "type": "leaf", "state": { "type": "starred", "state": {} } } ] } ], "direction": "horizontal", "width": 300 }, "right": { "id": "70ae06261ef3fc74", "type": "split", "children": [ { "id": "07672eb406645795", "type": "tabs", "children": [ { "id": "827e4aecb1891b44", "type": "leaf", "state": { "type": "backlink", "state": { "file": "CCN/VL01.md", "collapseAll": false, "extraContext": false, "sortOrder": "alphabetical", "showSearch": false, "searchQuery": "", "backlinkCollapsed": false, "unlinkedCollapsed": true } } }, { "id": "583573a993e5af09", "type": "leaf", "state": { "type": "outgoing-link", "state": { "file": "CCN/VL01.md", "linksCollapsed": false, "unlinkedCollapsed": true } } }, { "id": "fbf143571343fb20", "type": "leaf", "state": { "type": "tag", "state": { "sortOrder": "frequency", "useHierarchy": true } } }, { "id": "457947aad2c5e591", "type": "leaf", "state": { "type": "outline", "state": { "file": "CCN/VL01.md" } } }, { "id": "631d374a04a792db", "type": "leaf", "state": { "type": "advanced-tables-toolbar", "state": {} } }, { "id": "b3aa4e2b20626da4", "type": "leaf", "state": { "type": "calendar", "state": {} } }, { "id": "c3c39c68e6060e3e", "type": "leaf", "state": { "type": "juggl_nodes", "state": {} } }, { "id": "ccdfcdb588345764", "type": "leaf", "state": { "type": "juggl_style", "state": {} } } ], "currentTab": 4 } ], "direction": "horizontal", "width": 200, "collapsed": true }, "left-ribbon": { "hiddenItems": { "switcher:Open quick switcher": false, "graph:Open graph view": false, "canvas:Create new canvas": false, "daily-notes:Open today's daily note": false, "templates:Insert template": false, "command-palette:Open command palette": false, "table-editor-obsidian:Advanced Tables Toolbar": false, "obsidian-livesync:Replicate": false, "obsidian-livesync:Show log": false, "obsidian-advanced-slides:Show Slide Preview": false, "juggl:Juggl global graph": false } }, "active": "b8336cb3c3d06be9", "lastOpenFiles": [ "CCN/Ex01/ccn1-exercise1.pdf", "CCN/Ex01", "Informationssicherheit/Ueb2/Ueb2.md", "Informationssicherheit/Ueb2/Ueb2.pdf", "Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf", "Informationssicherheit/Ueb2/2023-04-17_15-55.png", "Informationssicherheit/Ueb2/2023-04-17_14-16.png", "Untitled 1.md", "Untitled.md", "Excalidraw/Drawing 2023-04-17 08.21.36.excalidraw.md", "Excalidraw/Drawing 2023-04-17 08.21.00.excalidraw.md", "Excalidraw", "FH/Informationssicherheit/Ueb2/Ueb2.md", "README.md", "FH/Informationssicherheit/Ueb2/test.md", "Informationssicherheit/Ueb2/test2.md", "Informationssicherheit/Ueb2/Untitled.md", "Informationssicherheit/Ueb1/01-ueb_uebungsblatt.pdf", "Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png", "Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png", "Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png", "Informationssicherheit/Ueb1/20230331_10h28m24s_grim.png", "Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png", "Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png", "Informationssicherheit/Ueb1/20230331_16h17m48s_grim.png", "Informationssicherheit/Ueb1/20230331_16h21m51s_grim.png", "Informationssicherheit/Ueb1/Ueb01.md", "Informationssicherheit/Ueb1/Ueb01.pdf", "Informationssicherheit/VL/01-orga-motivation-handout.pdf", "Informationssicherheit/VL/02-terminologie-handout.pdf", "Informationssicherheit/VL/03-fm-orga-handout.pdf", "CCN/VL01.md", "Algorithmen und Datenstrukturen/UEB01.md", "2023-04-16.md", "Informationssicherheit/Ueb1", "FH/2023-04-16.md", "FH/Informationssicherheit/Ueb1/Ueb01.md", "FH/Informationssicherheit/Ueb01.md", "FH/Algorithmen und Datenstrukturen/UEB01.md", "FH/CCN/VL01.md" ] }