Wednesday, December 31, 2008

Mastering MATLAB 7 or The Complete Cisco VPN Configuration Guide

Mastering MATLAB 7

Author: Duane C Hanselman

This book covers all essential aspects of MATLAB presented within an easy-to-follow "learn while doing" tutorial format. Discussees all new features of the latest release of MATLAB. Discusses integration of MATLAB with C, FORTRAN, AND Java; increases MATLAB's power and flexibility in dealing with external algorithms, datasets, and operating system capabilities. Offers thorough coverage of indexing, vectorizing, and linear algebra. Features abundant examples throughout and includes a chapter that specifically covers extensive examples. Includes a comprehensive index. A useful reference for engineers or anyone who uses MATLAB.



Table of Contents:
1Getting started1
2Basic features4
3The MATLAB desktop21
4Script M-files30
5Arrays and array operations38
6Multidimensional arrays97
7Numeric data types115
8Cell arrays and structures125
9Character strings159
10Relational and logical operations188
11Control flow200
12Functions215
13M-file debugging and profiling244
14File and directory management249
15Set, bit, and base functions261
16Time computations269
17Matrix algebra278
18Data analysis290
19Data interpolation310
20Polynomials326
21Cubic splines336
22Fourier analysis350
23Optimization359
24Integration and differentiation370
25Differential equations382
26Two-dimensional graphics397
27Three-dimensional graphics425
28Using color and light461
29Images, movies, and sound477
30Printing and exporting graphics487
31Handle graphics499
32Graphical user interfaces539
33MATLAB classes and object-oriented programming571
34MATLAB programming interfaces607
35Extending MATLAB with Java656
36Windows application integration700
37Getting help731
38Examples, examples, examples736
AppMATLAB release information805

Books about: Golda or Big Green Purse

The Complete Cisco VPN Configuration Guide

Author: Richard Deal

Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution

 
• A complete resource for understanding VPN components and VPN design issues
• Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients
• Discover troubleshooting tips and techniques from real-world scenarios based on the author’s vast field experience
• Filled with relevant configurations you can use immediately in your own network

With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information. As Cisco Systems® integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco® VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device, including concentrators, clients, routers, or Cisco PIX® and Cisco ASA security appliances. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN implementation designs.

Part I, “VPNs,” introduces the topic of VPNs and discusses today’s main technologies, including IPsec. It also spends an entire chapter on SSL VPNs, the newest VPNtechnology and one that Cisco has placed particular emphasis on since 2003. Part II, “Concentrators,” provides detail on today’s concentrator products and covers site-to-site and remote-access connection types with attention on IPsec and WebVPN. Part III covers the Cisco VPN Client versions 3.x and 4.x along with the Cisco3002 Hardware Client. Cisco IOS® routers are the topic of Part IV, covering scalable VPNs with Dynamic Multipoint VPN, router certificate authorities, and router remote access solutions. Part V explains Cisco PIX and Cisco ASA security appliances and their roles in VPN connectivity, including remote access and site-to-site connections. In Part VI, a case study shows how a VPN solution is best implemented in the real world using a variety of Cisco VPN products in a sample network.

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

 



No comments:

Post a Comment