Distinction between scalars (rank 0), vectors (rank 1), and second-order tensors (rank 2). The chapter explores algebraic operations such as addition, contraction, and the inner product of tensors.
): Definition and properties of the identity tensor, often used for substitutions and simplification of dot products.
Exploring the geometric implications of rotations (proper) versus reflections (improper). Why This Chapter is Critical
Introduction to the shorthand for sums over repeated indices, which is foundational for simplifying complex tensor expressions. Kronecker Delta ( δijdelta sub i j end-sub
In physical sciences, many quantities cannot be fully described by a single magnitude (scalar) or a single direction (vector). For example:
Describes internal forces within a deformable body.
Troubleshoot network issues that arise due to configuration changes.
Download a configuration file from a Cisco CMTS or network router to a PC.
Upload configuration changes to a Cisco router or switch via SNMP.
Access essential network and device configuration management tools to help you stay on top of config changes.
Easy-to-use tool for remotely and quickly configuring NetFlow v5 via SNMP on supported Cisco devices.
Distinction between scalars (rank 0), vectors (rank 1), and second-order tensors (rank 2). The chapter explores algebraic operations such as addition, contraction, and the inner product of tensors.
): Definition and properties of the identity tensor, often used for substitutions and simplification of dot products.
Exploring the geometric implications of rotations (proper) versus reflections (improper). Why This Chapter is Critical
Introduction to the shorthand for sums over repeated indices, which is foundational for simplifying complex tensor expressions. Kronecker Delta ( δijdelta sub i j end-sub
In physical sciences, many quantities cannot be fully described by a single magnitude (scalar) or a single direction (vector). For example:
Describes internal forces within a deformable body.
Significantly reduce the time required to isolate and identify a bandwidth or network segment failure.
Generate a "Magic Packet" to remotely power on PCs attached to networks.
Protect your enterprise network with a strong password generator.
Decrypt any Cisco type-7 passwords for routers and switches. Distinction between scalars (rank 0), vectors (rank 1),
Attack an IP address with SNMP queries to determine the SNMP read-only and read-write community strings.
Use permuted hacker dictionaries to attack devices in an attempt to break into them or discover community strings.
Perform Domain Name System-based Blackhole List (DNSBL) checks. Distinction between scalars (rank 0)
Remotely discover the devices that are connected to each port on a switch or hub.
Perform network stress tests with WAN Killer.