Files
cours-ISEN-MD/.obsidian/workspace.json

301 lines
10 KiB
JSON

{
"main": {
"id": "80edb8299950e81c",
"type": "split",
"children": [
{
"id": "a0965a7be66d6773",
"type": "tabs",
"children": [
{
"id": "e11a6a080eb83632",
"type": "leaf",
"state": {
"type": "markdown",
"state": {
"file": "ISEN/Sécurité IOT/CIPA4/Sécurité IOT TP1.md",
"mode": "source",
"source": false,
"backlinks": true,
"backlinkOpts": {
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical",
"showSearch": false,
"searchQuery": "",
"backlinkCollapsed": false,
"unlinkedCollapsed": true
}
},
"icon": "lucide-file",
"title": "Sécurité IOT TP1"
}
},
{
"id": "37a6109c5cf4f8fa",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "ISEN/Sécurité IOT/CIPA4/IoT.Firmware.Analysis.pdf"
},
"icon": "lucide-file-text",
"title": "IoT.Firmware.Analysis"
}
},
{
"id": "ae4f57562b1235e7",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "ISEN/Introduction a la cyber et a la cryptographie/CIPA 4/20250708_CRYPTO_exos_avec_corriges.pdf"
},
"icon": "lucide-file-text",
"title": "20250708_CRYPTO_exos_avec_corriges"
}
},
{
"id": "8d52247f0504a39c",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "ISEN/Introduction a la cyber et a la cryptographie/CIPA 4/20011126_fips-197.pdf"
},
"icon": "lucide-file-text",
"title": "20011126_fips-197"
}
}
]
}
],
"direction": "vertical"
},
"left": {
"id": "d3d4eea0bba5f59a",
"type": "split",
"children": [
{
"id": "e1170e13731b03ab",
"type": "tabs",
"children": [
{
"id": "622da1d4e0ba0f73",
"type": "leaf",
"state": {
"type": "file-explorer",
"state": {
"sortOrder": "alphabetical",
"autoReveal": false
},
"icon": "lucide-folder-closed",
"title": "Files"
}
},
{
"id": "0a8401764020cd87",
"type": "leaf",
"state": {
"type": "search",
"state": {
"query": "tag:#CIPA4",
"matchingCase": false,
"explainSearch": false,
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical"
},
"icon": "lucide-search",
"title": "Search"
}
},
{
"id": "8cf536f7a3e86d40",
"type": "leaf",
"state": {
"type": "bookmarks",
"state": {},
"icon": "lucide-bookmark",
"title": "Bookmarks"
}
}
]
}
],
"direction": "horizontal",
"width": 300
},
"right": {
"id": "620e2dd59da72017",
"type": "split",
"children": [
{
"id": "6b275ce780eb9e51",
"type": "tabs",
"children": [
{
"id": "a26c7d896ccf150d",
"type": "leaf",
"state": {
"type": "backlink",
"state": {
"file": "ISEN/Energie/CIPA3/Energie Cours 4.md",
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical",
"showSearch": false,
"searchQuery": "",
"backlinkCollapsed": false,
"unlinkedCollapsed": true
},
"icon": "links-coming-in",
"title": "Backlinks for Energie Cours 4"
}
},
{
"id": "447dae918b3ceb41",
"type": "leaf",
"state": {
"type": "outgoing-link",
"state": {
"file": "ISEN/Energie/CIPA3/Energie Cours 4.md",
"linksCollapsed": false,
"unlinkedCollapsed": true
},
"icon": "links-going-out",
"title": "Outgoing links from Energie Cours 4"
}
},
{
"id": "a1a2a7f3dfd58872",
"type": "leaf",
"state": {
"type": "tag",
"state": {
"sortOrder": "frequency",
"useHierarchy": false,
"showSearch": false,
"searchQuery": ""
},
"icon": "lucide-tags",
"title": "Tags"
}
},
{
"id": "879827be6c73ce1e",
"type": "leaf",
"state": {
"type": "outline",
"state": {
"file": "ISEN/Physique/CIPA3/Compte rendu TP Amplificateur Opérationnel et Contre-Réaction.md",
"followCursor": false,
"showSearch": false,
"searchQuery": ""
},
"icon": "lucide-list",
"title": "Outline of Compte rendu TP Amplificateur Opérationnel et Contre-Réaction"
}
},
{
"id": "fbc4c5274a72cd3d",
"type": "leaf",
"state": {
"type": "all-properties",
"state": {
"sortOrder": "frequency",
"showSearch": false,
"searchQuery": ""
},
"icon": "lucide-archive",
"title": "All properties"
}
},
{
"id": "cc56184c227b09ca",
"type": "leaf",
"state": {
"type": "git-view",
"state": {},
"icon": "git-pull-request",
"title": "Source Control"
}
}
],
"currentTab": 5
}
],
"direction": "horizontal",
"width": 319.5
},
"left-ribbon": {
"hiddenItems": {
"bases:Create new base": false,
"switcher:Open quick switcher": false,
"graph:Open graph view": false,
"canvas:Create new canvas": false,
"templates:Insert template": false,
"command-palette:Open command palette": false,
"audio-recorder:Start/stop recording": false,
"obsidian-git:Open Git source control": false
}
},
"active": "e11a6a080eb83632",
"lastOpenFiles": [
"ISEN/Sécurité IOT/CIPA4/IoT.Firmware.Analysis.pdf",
"ISEN/Sécurité IOT/CIPA4/Sécurité IOT TP1.md",
"ISEN/Introduction a la cyber et a la cryptographie/CIPA 4/20011126_fips-197.pdf",
"ISEN/Introduction a la cyber et a la cryptographie/CIPA 4/Crypto Cours 2.md",
"ISEN/Sécurité IOT/CIPA4/Firmware/extractions/iotdev_firmware.bin.extracted/120200/squashfs_120200.sqsh",
"ISEN/Sécurité IOT/CIPA4/Firmware/extractions/iotdev_firmware.bin.extracted/120200",
"ISEN/Sécurité IOT/CIPA4/Firmware/extractions/iotdev_firmware.bin.extracted",
"ISEN/Sécurité IOT/CIPA4/Firmware/extractions",
"ISEN/Sécurité IOT/CIPA4/Sécurité IOT Cours 1.md",
"ISEN/Introduction a la cyber et a la cryptographie/CIPA 4/20250708_CRYPTO_slides.pdf",
"ISEN/Sécurité IOT/CIPA4/Firmware/emulated.tgz",
"ISEN/Sécurité IOT/CIPA4/Firmware/iotdev_firmware.bin",
"ISEN/Sécurité IOT/CIPA4/Firmware",
"ISEN/Sécurité IOT/CIPA4/Sécurité IOT Cours 3.md",
"ISEN/Sécurité IOT/CIPA4/Sécurité IOT Cours 2.md",
"ISEN/Navigation de vehicule autonome/CIPA4/Navigation de véhicule autonome Cours 1.md",
"ISEN/Introduction a la cyber et a la cryptographie/CIPA 4/Cyber Cours 2.md",
"ISEN/Web/CIPA 4/TP/TP5/MPD.png",
"ISEN/Web/CIPA 4/TP/TP5/MCD.png",
"ISEN/Introduction a la cyber et a la cryptographie/CIPA 4/Crypto Cours 1.md",
"ISEN/Réunion/CIPA 3/Rentrée 2024-25.md",
"ISEN/Réunion/CIPA 3/Départ en entreprise 1 20-09-2024.md",
"ISEN/Réunion/CIPA 3/CR Conseil de scolarité S6.md",
"ISEN/Introduction a la cyber et a la cryptographie/CIPA 4/Cyber Cours 1.md",
"ISEN/Réunion/CIPA 4/Réunion international.md",
"ISEN/Cloud Computing/CIPA4/Cloud Computing Cours 3.md",
"ISEN/Cloud Computing/CIPA4/Cloud Computing Cours 4.md",
"ISEN/Cloud Computing/CIPA4/Cloud Computing Cours 2.md",
"ISEN/Cloud Computing/CIPA4/Cloud Computing Cours 5.md",
"ISEN/Cloud Computing/CIPA4/Cloud Computing Cours 1.md",
"ISEN/Cloud Computing/CIPA4/TP 4 Ansible.md",
"ISEN/Cloud Computing/CIPA4/TP 3 Ansible.md",
"ISEN/Cloud Computing/CIPA4/TP 2 Ansible.md",
"ISEN/Cloud Computing/CIPA4/TP 1 Ansible.md",
"ISEN/Introduction a la cyber et a la cryptographie/CIPA 4/Tunnel SSH TP.canvas",
"ISEN/English/CIPA4/16 janv 2026.md",
"ISEN/English/CIPA4/29 sept 2025.md",
"ISEN/English/A2/23 févr 2024.md",
"Pasted image 20251009192656.png",
"Pasted image 20250610091125.png",
"Pasted image 20240505210657.png",
"Pasted image 20240505210642.png",
"ISEN/Web/CIPA 4/TP/TP1/images/ISEN_Logo.png",
"src/Pasted image 20240130111505.png",
"src/Pasted image 20240123120819.png",
"src/Pasted image 20240123120807.png",
"ISEN/Réseau/A2/TP Ansible et docker.canvas",
"ISEN/BDD/CIR2/TD2.canvas",
"ISEN/Modelec/NB point.canvas",
"Untitled.canvas",
"ISEN/Other/Graph Overseer.canvas",
"ISEN/Algo C/A2/TP1 Exercice 1.canvas",
"ISEN/Algo C/A2/MergeSort.canvas",
"ISEN/FHS/A1/Stage/Organigramme Go-Recup.canvas",
"ISEN/FHS/A1/Démocratie/Mouvement Social.canvas"
]
}