Cargando…

EW 104 : EW against a new generation of threats /

The fourth book in the bestselling Artech House EW 100 series is dedicated to reviewing legacy threats and discussing new threats which have arisen since Y2K in communications, radar, and IR threats. Like its predecessors, EW 104 presents a series of highly informative and easy-to-comprehend tutoria...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Adamy, David (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston : Artech House, [2015]
Colección:Artech House electronic warfare library.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 KNOVEL_ocn935983110
003 OCoLC
005 20231027140348.0
006 m o d
007 cr cnu---unuuu
008 160125t20152015maua ob 001 0 eng d
010 |z  2015413595 
040 |a YDXCP  |b eng  |e rda  |e pn  |c YDXCP  |d N$T  |d OCLCF  |d B24X7  |d EBLCP  |d COO  |d D6H  |d AGLDB  |d NRC  |d ICA  |d DEBSZ  |d OCLCQ  |d K6U  |d VTS  |d VLB  |d STF  |d MERER  |d CUY  |d CEF  |d ERL  |d OCLCQ  |d LVT  |d KNOVL  |d AU@  |d M8D  |d UKAHL  |d ZCU  |d OCLCQ  |d VT2  |d OCLCO  |d OCLCQ  |d COA  |d OCLCQ 
019 |a 949847070  |a 1235828779  |a 1240525984  |a 1249248065  |a 1266291079  |a 1340108303 
020 |a 9781608078707  |q (electronic bk.) 
020 |a 1608078701  |q (electronic bk.) 
020 |a 9781523117178  |q (electronic bk.) 
020 |a 1523117176  |q (electronic bk.) 
020 |z 9781608078691  |q (hardback) 
020 |z 1608078698  |q (hardback) 
024 8 |a (WaSeSS)ssj0001623845 
029 1 |a AU@  |b 000057214274 
029 1 |a DEBSZ  |b 484760904 
035 |a (OCoLC)935983110  |z (OCoLC)949847070  |z (OCoLC)1235828779  |z (OCoLC)1240525984  |z (OCoLC)1249248065  |z (OCoLC)1266291079  |z (OCoLC)1340108303 
050 4 |a UG485  |b .A33224 2015eb 
072 7 |a TEC  |x 025000  |2 bisacsh 
082 0 4 |a 623/.043  |2 23 
049 |a UAMI 
100 1 |a Adamy, David,  |e author. 
245 1 0 |a EW 104 :  |b EW against a new generation of threats /  |c David L. Adamy. 
246 3 0 |a EW against a new generation of threats 
264 1 |a Boston :  |b Artech House,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
336 |a still image  |b sti  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a The Artech House electronic warfare library 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
505 0 |a EW 104: EW Against a New Generation of Threats; Contents; Preface; 1 Introduction; 2 Spectrum Warfare; 2.1#Changes in Warfare; 2.2#Some Specific Propagation Related Issues; 2.3#Connectivity; 2.3.1#The Most Basic Connectivity; 2.3.2#Connectivity Requirements; 2.3.3#Long-Range Information Transmission; 2.3.4#Information Fidelity; 2.4#Interference Rejection; 2.4.1#Spreading the Transmitted Spectrum; 2.4.2#Commercial FM Broadcast; 2.4.3#Military Spread Spectrum Signals; 2.5#Bandwidth Requirements for Information Transfer; 2.5.1#Data Transfer Without a Link; 2.5.2#Linked Data Transmission. 
505 8 |a 2.5.3#Software Location2.6#Distributed Military Capability; 2.6.1#Net-Centric Warfare; 2.7#Transmission Security Versus Message Security; 2.7.1#Transmission Security Versus Transmission Bandwidth; 2.7.2#Bandwidth Limitations; 2.8#Cyber Warfare Versus EW ; 2.8.1#Cyber Warfare; 2.8.2#Cyber Attacks; 2.8.3#Parallels Between Cyber Warfare and EW; 2.8.4#Difference Between Cyber Warfare and EW; 2.9#Bandwidth Trade-Offs ; 2.9.1#Bit-Error Critical Cases; 2.10#Error Correction Approaches; 2.10.1#Error Detection and Correction Codes; 2.10.2#Example of a Block Code. 
505 8 |a 2.10.3#Error Correction Versus Bandwidth2.11#EMS Warfare Practicalities; 2.11.1#Warfare Domains; 2.12#Steganography; 2.12.1#Steganography Versus Encryption; 2.12.2#Early Stenographic Techniques; 2.12.3#Digital Techniques; 2.12.4#How Does Steganography Relate to Spectrum Warfare?; 2.12.5#How Is Steganography Detected?; 2.13#Link Jamming ; 2.13.1#Communication Jamming; 2.13.2#Required J/S for Jamming Digital Signals; 2.13.3#Protections Against Link Jamming; 2.13.4#The Net Impact on Link Jamming ; 3 Legacy Radars; 3.1#Threat Parameters; 3.1.1#Typical Legacy Surface-to-Air Missile. 
505 8 |a 3.1.2#Typical Legacy Acquisition Radar3.1.3#Typical Anti-Aircraft Gun; 3.2#EW Techniques; 3.3#Radar Jamming ; 3.3.1#Jamming-to-Signal Ratio; 3.3.2#Self-Protection Jamming; 3.3.3#Remote Jamming; 3.3.4#Burn-Through Range; 3.4#Radar-Jamming Techniques; 3.4.1#Cover Jamming; 3.4.2#Barrage Jamming; 3.4.3#Spot Jamming; 3.4.4#Swept Spot Jamming; 3.4.5#Deceptive Jamming; 3.4.6#Range Deception Techniques; 3.4.7#Angle Deceptive Jamming; 3.4.8#Frequency Gate Pull Off; 3.4.9#Jamming Monopulse Radars; 3.4.10#Formation Jamming; 3.4.11#Formation Jamming with Range Denial; 3.4.12#Blinking. 
505 8 |a 3.4.13#Terrain Bounce3.4.14#Cross-Polarization Jamming; 3.4.15#Cross-Eye Jamming; References; 4 Next Generation Threat Radars; 4.1#Threat Radar Improvements; 4.2#Radar Electronic Protection Techniques; 4.2.1#Useful Resources; 4.2.2#Ultralow Side Lobes; 4.2.3#EW Impact of Reduced Side-Lobe Level; 4.2.4#Side-Lobe Cancellation; 4.2.5#Side-Lobe Blanking; 4.2.6#Monopulse Radar; 4.2.7#Cross-Polarization Jamming; 4.2.8#Anti-Cross-Polarization; 4.2.9#Chirped Radar; 4.2.10#Barker Code; 4.2.11#Range Gate Pull-Off; 4.2.12#AGC Jamming; 4.2.13#Noise-Jamming Quality. 
520 |a The fourth book in the bestselling Artech House EW 100 series is dedicated to reviewing legacy threats and discussing new threats which have arisen since Y2K in communications, radar, and IR threats. Like its predecessors, EW 104 presents a series of highly informative and easy-to-comprehend tutorials, along with insightful introductory and connective material that helps you understand how each aspect fits together. This reference starts with a review of the generalities of legacy threats, from the technical point of view, with a focus on what makes the new threats more challenging. Readers are. 
590 |a Knovel  |b ACADEMIC - General Engineering & Project Administration 
590 |a Knovel  |b ACADEMIC - Aerospace & Radar Technology 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Electronics in military engineering. 
650 0 |a Electronic countermeasures. 
650 6 |a Contre-mesures électroniques. 
650 7 |a TECHNOLOGY & ENGINEERING  |x Military Science.  |2 bisacsh 
650 7 |a Electronic countermeasures.  |2 fast  |0 (OCoLC)fst00906940 
650 7 |a Electronics in military engineering.  |2 fast  |0 (OCoLC)fst00907609 
776 0 8 |i Print version:  |a Adamy, David.  |t EW 104  |z 9781608078691  |w (DLC) 2015413595  |w (OCoLC)908411037 
830 0 |a Artech House electronic warfare library. 
856 4 0 |u https://appknovel.uam.elogim.com/kn/resources/kpEWEWNGT2/toc  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH30683824 
938 |a Books 24x7  |b B247  |n bke00111999 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1983119 
938 |a EBSCOhost  |b EBSC  |n 1155202 
938 |a IEEE  |b IEEE  |n 9100860 
938 |a YBP Library Services  |b YANK  |n 12810357 
994 |a 92  |b IZTAP