|
13 | 13 | "state": { |
14 | 14 | "type": "markdown", |
15 | 15 | "state": { |
16 | | - "file": "software-engineering/Azure/AZ500.md", |
| 16 | + "file": "software-engineering/security/CISA.md", |
17 | 17 | "mode": "source", |
18 | 18 | "source": false |
19 | 19 | }, |
20 | 20 | "icon": "lucide-file", |
21 | | - "title": "AZ500" |
| 21 | + "title": "CISA" |
22 | 22 | } |
23 | 23 | } |
24 | 24 | ] |
|
40 | 40 | "state": { |
41 | 41 | "type": "file-explorer", |
42 | 42 | "state": { |
43 | | - "sortOrder": "alphabetical" |
| 43 | + "sortOrder": "alphabetical", |
| 44 | + "autoReveal": false |
44 | 45 | }, |
45 | 46 | "icon": "lucide-folder-closed", |
46 | 47 | "title": "Files" |
|
79 | 80 | "state": { |
80 | 81 | "type": "outline", |
81 | 82 | "state": { |
82 | | - "file": "software-engineering/Azure/AZ500.md" |
| 83 | + "file": "software-engineering/security/CISA.md", |
| 84 | + "followCursor": false, |
| 85 | + "showSearch": false, |
| 86 | + "searchQuery": "" |
83 | 87 | }, |
84 | 88 | "icon": "lucide-list", |
85 | | - "title": "Outline of AZ500" |
| 89 | + "title": "Outline of CISA" |
86 | 90 | } |
87 | 91 | } |
88 | 92 | ], |
|
167 | 171 | }, |
168 | 172 | "active": "d04aa7fecda1a23c", |
169 | 173 | "lastOpenFiles": [ |
| 174 | + "software-engineering/security/Fundamental-security-models.md", |
| 175 | + "software-engineering/security/CISA.md", |
| 176 | + "[Security.md", |
| 177 | + "software-engineering/Azure/AZ500.md", |
| 178 | + "science/rationality.md", |
170 | 179 | "science/strategy-and-game-theory-for-management.md", |
171 | | - "science/Theoretical-concepts-to-keep-in-mind.md", |
| 180 | + "science/think-again.md", |
172 | 181 | "books/critical thinking/the-art-of-strategy.md", |
| 182 | + "science/critical-thinking.md", |
| 183 | + "science/Theoretical-concepts-to-keep-in-mind.md", |
173 | 184 | "entrepreneurship/the-almanack-of-naval-ravikant.md", |
174 | | - "science/think-again.md", |
175 | 185 | "brain/think-again-how-to-reason.md", |
176 | 186 | "music/Music.md", |
177 | | - "science/rationality.md", |
178 | 187 | "philosophy/quotes-and-life-guidelines.md", |
179 | 188 | "index.md", |
180 | | - "science/critical-thinking.md", |
181 | 189 | "books/the-almanack-of-naval-ravikant.md", |
182 | 190 | "philosophy/rational-buddhism.md", |
183 | 191 | "science/elephant-in-the-brain-vs-good-inside.md", |
184 | 192 | "philosophy", |
185 | 193 | "critical thinking.md", |
186 | 194 | "economics/microeconomics.md", |
187 | 195 | "economics", |
188 | | - "software-engineering/Azure/AZ500.md", |
189 | 196 | "img/kerberos-authentication-illustration.jpg", |
190 | 197 | "img/kerberos-authentication-illustration.jpg.crdownload", |
191 | 198 | "software-engineering/Azure/AZ104.md", |
|
194 | 201 | "software-engineering/security/CISSP/domain-2.md", |
195 | 202 | "software-engineering/security/CISSP/think-like-a-manager.md", |
196 | 203 | "books/management/the-managers-path.md", |
197 | | - "books/management/an-elegant-puzzle.md", |
198 | | - "books/emotions/emotional-intelligence.md", |
199 | 204 | "books/emotions", |
200 | | - "Untitled.md", |
201 | 205 | "software-engineering/security/img/roles-risks-pyramid.png", |
202 | 206 | "software-engineering/security/img", |
203 | 207 | "software-engineering/security/CISSP", |
|
0 commit comments