EW 104 :: EW against a new generation of threats /
The fourth book in the bestselling Artech House EW 100 series is dedicated to reviewing legacy threats and discussing new threats which have arisen since Y2K in communications, radar, and IR threats. Like its predecessors, EW 104 presents a series of highly informative and easy-to-comprehend tutoria...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston :
Artech House,
[2015]
|
Schriftenreihe: | Artech House electronic warfare library.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | The fourth book in the bestselling Artech House EW 100 series is dedicated to reviewing legacy threats and discussing new threats which have arisen since Y2K in communications, radar, and IR threats. Like its predecessors, EW 104 presents a series of highly informative and easy-to-comprehend tutorials, along with insightful introductory and connective material that helps you understand how each aspect fits together. This reference starts with a review of the generalities of legacy threats, from the technical point of view, with a focus on what makes the new threats more challenging. Readers are. |
Beschreibung: | 1 online resource : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781608078707 1608078701 9781523117178 1523117176 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn935983110 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 160125t20152015maua ob 001 0 eng d | ||
010 | |z 2015413595 | ||
040 | |a YDXCP |b eng |e rda |e pn |c YDXCP |d N$T |d OCLCF |d B24X7 |d EBLCP |d COO |d D6H |d AGLDB |d NRC |d ICA |d DEBSZ |d OCLCQ |d K6U |d VTS |d VLB |d STF |d MERER |d CUY |d CEF |d ERL |d OCLCQ |d LVT |d KNOVL |d AU@ |d M8D |d UKAHL |d ZCU |d OCLCQ |d VT2 |d OCLCO |d OCLCQ |d COA |d OCLCQ |d OCLCO |d OCLCL |d SXB | ||
019 | |a 949847070 |a 1235828779 |a 1240525984 |a 1249248065 |a 1266291079 |a 1340108303 | ||
020 | |a 9781608078707 |q (electronic bk.) | ||
020 | |a 1608078701 |q (electronic bk.) | ||
020 | |a 9781523117178 |q (electronic bk.) | ||
020 | |a 1523117176 |q (electronic bk.) | ||
020 | |z 9781608078691 |q (hardback) | ||
020 | |z 1608078698 |q (hardback) | ||
024 | 8 | |a (WaSeSS)ssj0001623845 | |
035 | |a (OCoLC)935983110 |z (OCoLC)949847070 |z (OCoLC)1235828779 |z (OCoLC)1240525984 |z (OCoLC)1249248065 |z (OCoLC)1266291079 |z (OCoLC)1340108303 | ||
050 | 4 | |a UG485 |b .A33224 2015eb | |
072 | 7 | |a TEC |x 025000 |2 bisacsh | |
082 | 7 | |a 623/.043 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Adamy, David, |e author. | |
245 | 1 | 0 | |a EW 104 : |b EW against a new generation of threats / |c David L. Adamy. |
246 | 3 | 0 | |a EW against a new generation of threats |
264 | 1 | |a Boston : |b Artech House, |c [2015] | |
264 | 4 | |c ©2015 | |
300 | |a 1 online resource : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
336 | |a still image |b sti |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a The Artech House electronic warfare library | |
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a EW 104: EW Against a New Generation of Threats; Contents; Preface; 1 Introduction; 2 Spectrum Warfare; 2.1#Changes in Warfare; 2.2#Some Specific Propagation Related Issues; 2.3#Connectivity; 2.3.1#The Most Basic Connectivity; 2.3.2#Connectivity Requirements; 2.3.3#Long-Range Information Transmission; 2.3.4#Information Fidelity; 2.4#Interference Rejection; 2.4.1#Spreading the Transmitted Spectrum; 2.4.2#Commercial FM Broadcast; 2.4.3#Military Spread Spectrum Signals; 2.5#Bandwidth Requirements for Information Transfer; 2.5.1#Data Transfer Without a Link; 2.5.2#Linked Data Transmission. | |
505 | 8 | |a 2.5.3#Software Location2.6#Distributed Military Capability; 2.6.1#Net-Centric Warfare; 2.7#Transmission Security Versus Message Security; 2.7.1#Transmission Security Versus Transmission Bandwidth; 2.7.2#Bandwidth Limitations; 2.8#Cyber Warfare Versus EW ; 2.8.1#Cyber Warfare; 2.8.2#Cyber Attacks; 2.8.3#Parallels Between Cyber Warfare and EW; 2.8.4#Difference Between Cyber Warfare and EW; 2.9#Bandwidth Trade-Offs ; 2.9.1#Bit-Error Critical Cases; 2.10#Error Correction Approaches; 2.10.1#Error Detection and Correction Codes; 2.10.2#Example of a Block Code. | |
505 | 8 | |a 2.10.3#Error Correction Versus Bandwidth2.11#EMS Warfare Practicalities; 2.11.1#Warfare Domains; 2.12#Steganography; 2.12.1#Steganography Versus Encryption; 2.12.2#Early Stenographic Techniques; 2.12.3#Digital Techniques; 2.12.4#How Does Steganography Relate to Spectrum Warfare?; 2.12.5#How Is Steganography Detected?; 2.13#Link Jamming ; 2.13.1#Communication Jamming; 2.13.2#Required J/S for Jamming Digital Signals; 2.13.3#Protections Against Link Jamming; 2.13.4#The Net Impact on Link Jamming ; 3 Legacy Radars; 3.1#Threat Parameters; 3.1.1#Typical Legacy Surface-to-Air Missile. | |
505 | 8 | |a 3.1.2#Typical Legacy Acquisition Radar3.1.3#Typical Anti-Aircraft Gun; 3.2#EW Techniques; 3.3#Radar Jamming ; 3.3.1#Jamming-to-Signal Ratio; 3.3.2#Self-Protection Jamming; 3.3.3#Remote Jamming; 3.3.4#Burn-Through Range; 3.4#Radar-Jamming Techniques; 3.4.1#Cover Jamming; 3.4.2#Barrage Jamming; 3.4.3#Spot Jamming; 3.4.4#Swept Spot Jamming; 3.4.5#Deceptive Jamming; 3.4.6#Range Deception Techniques; 3.4.7#Angle Deceptive Jamming; 3.4.8#Frequency Gate Pull Off; 3.4.9#Jamming Monopulse Radars; 3.4.10#Formation Jamming; 3.4.11#Formation Jamming with Range Denial; 3.4.12#Blinking. | |
505 | 8 | |a 3.4.13#Terrain Bounce3.4.14#Cross-Polarization Jamming; 3.4.15#Cross-Eye Jamming; References; 4 Next Generation Threat Radars; 4.1#Threat Radar Improvements; 4.2#Radar Electronic Protection Techniques; 4.2.1#Useful Resources; 4.2.2#Ultralow Side Lobes; 4.2.3#EW Impact of Reduced Side-Lobe Level; 4.2.4#Side-Lobe Cancellation; 4.2.5#Side-Lobe Blanking; 4.2.6#Monopulse Radar; 4.2.7#Cross-Polarization Jamming; 4.2.8#Anti-Cross-Polarization; 4.2.9#Chirped Radar; 4.2.10#Barker Code; 4.2.11#Range Gate Pull-Off; 4.2.12#AGC Jamming; 4.2.13#Noise-Jamming Quality. | |
520 | |a The fourth book in the bestselling Artech House EW 100 series is dedicated to reviewing legacy threats and discussing new threats which have arisen since Y2K in communications, radar, and IR threats. Like its predecessors, EW 104 presents a series of highly informative and easy-to-comprehend tutorials, along with insightful introductory and connective material that helps you understand how each aspect fits together. This reference starts with a review of the generalities of legacy threats, from the technical point of view, with a focus on what makes the new threats more challenging. Readers are. | ||
650 | 0 | |a Electronics in military engineering. |0 http://id.loc.gov/authorities/subjects/sh85042404 | |
650 | 0 | |a Electronic countermeasures. |0 http://id.loc.gov/authorities/subjects/sh85042287 | |
650 | 6 | |a Contre-mesures électroniques. | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Military Science. |2 bisacsh | |
650 | 7 | |a Electronic countermeasures |2 fast | |
650 | 7 | |a Electronics in military engineering |2 fast | |
655 | 4 | |a Electronic book. | |
758 | |i has work: |a EW 104 (Text) |1 https://id.oclc.org/worldcat/entity/E39PCH6r6VXJ9JyKGMMcCDpFDm |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Adamy, David. |t EW 104 |z 9781608078691 |w (DLC) 2015413595 |w (OCoLC)908411037 |
830 | 0 | |a Artech House electronic warfare library. |0 http://id.loc.gov/authorities/names/no2010127357 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1155202 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH30683824 | ||
938 | |a Books 24x7 |b B247 |n bke00111999 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL1983119 | ||
938 | |a EBSCOhost |b EBSC |n 1155202 | ||
938 | |a IEEE |b IEEE |n 9100860 | ||
938 | |a YBP Library Services |b YANK |n 12810357 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn935983110 |
---|---|
_version_ | 1816882337525268480 |
adam_text | |
any_adam_object | |
author | Adamy, David |
author_facet | Adamy, David |
author_role | aut |
author_sort | Adamy, David |
author_variant | d a da |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | U - Military Science |
callnumber-label | UG485 |
callnumber-raw | UG485 .A33224 2015eb |
callnumber-search | UG485 .A33224 2015eb |
callnumber-sort | UG 3485 A33224 42015EB |
callnumber-subject | UG - Military Engineering and Air Forces |
collection | ZDB-4-EBA |
contents | EW 104: EW Against a New Generation of Threats; Contents; Preface; 1 Introduction; 2 Spectrum Warfare; 2.1#Changes in Warfare; 2.2#Some Specific Propagation Related Issues; 2.3#Connectivity; 2.3.1#The Most Basic Connectivity; 2.3.2#Connectivity Requirements; 2.3.3#Long-Range Information Transmission; 2.3.4#Information Fidelity; 2.4#Interference Rejection; 2.4.1#Spreading the Transmitted Spectrum; 2.4.2#Commercial FM Broadcast; 2.4.3#Military Spread Spectrum Signals; 2.5#Bandwidth Requirements for Information Transfer; 2.5.1#Data Transfer Without a Link; 2.5.2#Linked Data Transmission. 2.5.3#Software Location2.6#Distributed Military Capability; 2.6.1#Net-Centric Warfare; 2.7#Transmission Security Versus Message Security; 2.7.1#Transmission Security Versus Transmission Bandwidth; 2.7.2#Bandwidth Limitations; 2.8#Cyber Warfare Versus EW ; 2.8.1#Cyber Warfare; 2.8.2#Cyber Attacks; 2.8.3#Parallels Between Cyber Warfare and EW; 2.8.4#Difference Between Cyber Warfare and EW; 2.9#Bandwidth Trade-Offs ; 2.9.1#Bit-Error Critical Cases; 2.10#Error Correction Approaches; 2.10.1#Error Detection and Correction Codes; 2.10.2#Example of a Block Code. 2.10.3#Error Correction Versus Bandwidth2.11#EMS Warfare Practicalities; 2.11.1#Warfare Domains; 2.12#Steganography; 2.12.1#Steganography Versus Encryption; 2.12.2#Early Stenographic Techniques; 2.12.3#Digital Techniques; 2.12.4#How Does Steganography Relate to Spectrum Warfare?; 2.12.5#How Is Steganography Detected?; 2.13#Link Jamming ; 2.13.1#Communication Jamming; 2.13.2#Required J/S for Jamming Digital Signals; 2.13.3#Protections Against Link Jamming; 2.13.4#The Net Impact on Link Jamming ; 3 Legacy Radars; 3.1#Threat Parameters; 3.1.1#Typical Legacy Surface-to-Air Missile. 3.1.2#Typical Legacy Acquisition Radar3.1.3#Typical Anti-Aircraft Gun; 3.2#EW Techniques; 3.3#Radar Jamming ; 3.3.1#Jamming-to-Signal Ratio; 3.3.2#Self-Protection Jamming; 3.3.3#Remote Jamming; 3.3.4#Burn-Through Range; 3.4#Radar-Jamming Techniques; 3.4.1#Cover Jamming; 3.4.2#Barrage Jamming; 3.4.3#Spot Jamming; 3.4.4#Swept Spot Jamming; 3.4.5#Deceptive Jamming; 3.4.6#Range Deception Techniques; 3.4.7#Angle Deceptive Jamming; 3.4.8#Frequency Gate Pull Off; 3.4.9#Jamming Monopulse Radars; 3.4.10#Formation Jamming; 3.4.11#Formation Jamming with Range Denial; 3.4.12#Blinking. 3.4.13#Terrain Bounce3.4.14#Cross-Polarization Jamming; 3.4.15#Cross-Eye Jamming; References; 4 Next Generation Threat Radars; 4.1#Threat Radar Improvements; 4.2#Radar Electronic Protection Techniques; 4.2.1#Useful Resources; 4.2.2#Ultralow Side Lobes; 4.2.3#EW Impact of Reduced Side-Lobe Level; 4.2.4#Side-Lobe Cancellation; 4.2.5#Side-Lobe Blanking; 4.2.6#Monopulse Radar; 4.2.7#Cross-Polarization Jamming; 4.2.8#Anti-Cross-Polarization; 4.2.9#Chirped Radar; 4.2.10#Barker Code; 4.2.11#Range Gate Pull-Off; 4.2.12#AGC Jamming; 4.2.13#Noise-Jamming Quality. |
ctrlnum | (OCoLC)935983110 |
dewey-full | 623/.043 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 623 - Military and nautical engineering |
dewey-raw | 623/.043 |
dewey-search | 623/.043 |
dewey-sort | 3623 243 |
dewey-tens | 620 - Engineering and allied operations |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06604cam a2200721 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn935983110</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">160125t20152015maua ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2015413595</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">YDXCP</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">YDXCP</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">B24X7</subfield><subfield code="d">EBLCP</subfield><subfield code="d">COO</subfield><subfield code="d">D6H</subfield><subfield code="d">AGLDB</subfield><subfield code="d">NRC</subfield><subfield code="d">ICA</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">VTS</subfield><subfield code="d">VLB</subfield><subfield code="d">STF</subfield><subfield code="d">MERER</subfield><subfield code="d">CUY</subfield><subfield code="d">CEF</subfield><subfield code="d">ERL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LVT</subfield><subfield code="d">KNOVL</subfield><subfield code="d">AU@</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">949847070</subfield><subfield code="a">1235828779</subfield><subfield code="a">1240525984</subfield><subfield code="a">1249248065</subfield><subfield code="a">1266291079</subfield><subfield code="a">1340108303</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781608078707</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1608078701</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781523117178</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1523117176</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781608078691</subfield><subfield code="q">(hardback)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1608078698</subfield><subfield code="q">(hardback)</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">(WaSeSS)ssj0001623845</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)935983110</subfield><subfield code="z">(OCoLC)949847070</subfield><subfield code="z">(OCoLC)1235828779</subfield><subfield code="z">(OCoLC)1240525984</subfield><subfield code="z">(OCoLC)1249248065</subfield><subfield code="z">(OCoLC)1266291079</subfield><subfield code="z">(OCoLC)1340108303</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">UG485</subfield><subfield code="b">.A33224 2015eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">025000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">623/.043</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Adamy, David,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">EW 104 :</subfield><subfield code="b">EW against a new generation of threats /</subfield><subfield code="c">David L. Adamy.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">EW against a new generation of threats</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston :</subfield><subfield code="b">Artech House,</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">still image</subfield><subfield code="b">sti</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">The Artech House electronic warfare library</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">EW 104: EW Against a New Generation of Threats; Contents; Preface; 1 Introduction; 2 Spectrum Warfare; 2.1#Changes in Warfare; 2.2#Some Specific Propagation Related Issues; 2.3#Connectivity; 2.3.1#The Most Basic Connectivity; 2.3.2#Connectivity Requirements; 2.3.3#Long-Range Information Transmission; 2.3.4#Information Fidelity; 2.4#Interference Rejection; 2.4.1#Spreading the Transmitted Spectrum; 2.4.2#Commercial FM Broadcast; 2.4.3#Military Spread Spectrum Signals; 2.5#Bandwidth Requirements for Information Transfer; 2.5.1#Data Transfer Without a Link; 2.5.2#Linked Data Transmission.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.5.3#Software Location2.6#Distributed Military Capability; 2.6.1#Net-Centric Warfare; 2.7#Transmission Security Versus Message Security; 2.7.1#Transmission Security Versus Transmission Bandwidth; 2.7.2#Bandwidth Limitations; 2.8#Cyber Warfare Versus EW ; 2.8.1#Cyber Warfare; 2.8.2#Cyber Attacks; 2.8.3#Parallels Between Cyber Warfare and EW; 2.8.4#Difference Between Cyber Warfare and EW; 2.9#Bandwidth Trade-Offs ; 2.9.1#Bit-Error Critical Cases; 2.10#Error Correction Approaches; 2.10.1#Error Detection and Correction Codes; 2.10.2#Example of a Block Code.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.10.3#Error Correction Versus Bandwidth2.11#EMS Warfare Practicalities; 2.11.1#Warfare Domains; 2.12#Steganography; 2.12.1#Steganography Versus Encryption; 2.12.2#Early Stenographic Techniques; 2.12.3#Digital Techniques; 2.12.4#How Does Steganography Relate to Spectrum Warfare?; 2.12.5#How Is Steganography Detected?; 2.13#Link Jamming ; 2.13.1#Communication Jamming; 2.13.2#Required J/S for Jamming Digital Signals; 2.13.3#Protections Against Link Jamming; 2.13.4#The Net Impact on Link Jamming ; 3 Legacy Radars; 3.1#Threat Parameters; 3.1.1#Typical Legacy Surface-to-Air Missile.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.1.2#Typical Legacy Acquisition Radar3.1.3#Typical Anti-Aircraft Gun; 3.2#EW Techniques; 3.3#Radar Jamming ; 3.3.1#Jamming-to-Signal Ratio; 3.3.2#Self-Protection Jamming; 3.3.3#Remote Jamming; 3.3.4#Burn-Through Range; 3.4#Radar-Jamming Techniques; 3.4.1#Cover Jamming; 3.4.2#Barrage Jamming; 3.4.3#Spot Jamming; 3.4.4#Swept Spot Jamming; 3.4.5#Deceptive Jamming; 3.4.6#Range Deception Techniques; 3.4.7#Angle Deceptive Jamming; 3.4.8#Frequency Gate Pull Off; 3.4.9#Jamming Monopulse Radars; 3.4.10#Formation Jamming; 3.4.11#Formation Jamming with Range Denial; 3.4.12#Blinking.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.4.13#Terrain Bounce3.4.14#Cross-Polarization Jamming; 3.4.15#Cross-Eye Jamming; References; 4 Next Generation Threat Radars; 4.1#Threat Radar Improvements; 4.2#Radar Electronic Protection Techniques; 4.2.1#Useful Resources; 4.2.2#Ultralow Side Lobes; 4.2.3#EW Impact of Reduced Side-Lobe Level; 4.2.4#Side-Lobe Cancellation; 4.2.5#Side-Lobe Blanking; 4.2.6#Monopulse Radar; 4.2.7#Cross-Polarization Jamming; 4.2.8#Anti-Cross-Polarization; 4.2.9#Chirped Radar; 4.2.10#Barker Code; 4.2.11#Range Gate Pull-Off; 4.2.12#AGC Jamming; 4.2.13#Noise-Jamming Quality.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The fourth book in the bestselling Artech House EW 100 series is dedicated to reviewing legacy threats and discussing new threats which have arisen since Y2K in communications, radar, and IR threats. Like its predecessors, EW 104 presents a series of highly informative and easy-to-comprehend tutorials, along with insightful introductory and connective material that helps you understand how each aspect fits together. This reference starts with a review of the generalities of legacy threats, from the technical point of view, with a focus on what makes the new threats more challenging. Readers are.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronics in military engineering.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85042404</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic countermeasures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85042287</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Contre-mesures électroniques.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Military Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic countermeasures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronics in military engineering</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic book.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">EW 104 (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCH6r6VXJ9JyKGMMcCDpFDm</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Adamy, David.</subfield><subfield code="t">EW 104</subfield><subfield code="z">9781608078691</subfield><subfield code="w">(DLC) 2015413595</subfield><subfield code="w">(OCoLC)908411037</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Artech House electronic warfare library.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2010127357</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1155202</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH30683824</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bke00111999</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1983119</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1155202</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">IEEE</subfield><subfield code="b">IEEE</subfield><subfield code="n">9100860</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12810357</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic book. |
genre_facet | Electronic book. |
id | ZDB-4-EBA-ocn935983110 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:27:01Z |
institution | BVB |
isbn | 9781608078707 1608078701 9781523117178 1523117176 |
language | English |
oclc_num | 935983110 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Artech House, |
record_format | marc |
series | Artech House electronic warfare library. |
series2 | The Artech House electronic warfare library |
spelling | Adamy, David, author. EW 104 : EW against a new generation of threats / David L. Adamy. EW against a new generation of threats Boston : Artech House, [2015] ©2015 1 online resource : illustrations text txt rdacontent still image sti rdacontent computer c rdamedia online resource cr rdacarrier The Artech House electronic warfare library Print version record. Includes bibliographical references and index. EW 104: EW Against a New Generation of Threats; Contents; Preface; 1 Introduction; 2 Spectrum Warfare; 2.1#Changes in Warfare; 2.2#Some Specific Propagation Related Issues; 2.3#Connectivity; 2.3.1#The Most Basic Connectivity; 2.3.2#Connectivity Requirements; 2.3.3#Long-Range Information Transmission; 2.3.4#Information Fidelity; 2.4#Interference Rejection; 2.4.1#Spreading the Transmitted Spectrum; 2.4.2#Commercial FM Broadcast; 2.4.3#Military Spread Spectrum Signals; 2.5#Bandwidth Requirements for Information Transfer; 2.5.1#Data Transfer Without a Link; 2.5.2#Linked Data Transmission. 2.5.3#Software Location2.6#Distributed Military Capability; 2.6.1#Net-Centric Warfare; 2.7#Transmission Security Versus Message Security; 2.7.1#Transmission Security Versus Transmission Bandwidth; 2.7.2#Bandwidth Limitations; 2.8#Cyber Warfare Versus EW ; 2.8.1#Cyber Warfare; 2.8.2#Cyber Attacks; 2.8.3#Parallels Between Cyber Warfare and EW; 2.8.4#Difference Between Cyber Warfare and EW; 2.9#Bandwidth Trade-Offs ; 2.9.1#Bit-Error Critical Cases; 2.10#Error Correction Approaches; 2.10.1#Error Detection and Correction Codes; 2.10.2#Example of a Block Code. 2.10.3#Error Correction Versus Bandwidth2.11#EMS Warfare Practicalities; 2.11.1#Warfare Domains; 2.12#Steganography; 2.12.1#Steganography Versus Encryption; 2.12.2#Early Stenographic Techniques; 2.12.3#Digital Techniques; 2.12.4#How Does Steganography Relate to Spectrum Warfare?; 2.12.5#How Is Steganography Detected?; 2.13#Link Jamming ; 2.13.1#Communication Jamming; 2.13.2#Required J/S for Jamming Digital Signals; 2.13.3#Protections Against Link Jamming; 2.13.4#The Net Impact on Link Jamming ; 3 Legacy Radars; 3.1#Threat Parameters; 3.1.1#Typical Legacy Surface-to-Air Missile. 3.1.2#Typical Legacy Acquisition Radar3.1.3#Typical Anti-Aircraft Gun; 3.2#EW Techniques; 3.3#Radar Jamming ; 3.3.1#Jamming-to-Signal Ratio; 3.3.2#Self-Protection Jamming; 3.3.3#Remote Jamming; 3.3.4#Burn-Through Range; 3.4#Radar-Jamming Techniques; 3.4.1#Cover Jamming; 3.4.2#Barrage Jamming; 3.4.3#Spot Jamming; 3.4.4#Swept Spot Jamming; 3.4.5#Deceptive Jamming; 3.4.6#Range Deception Techniques; 3.4.7#Angle Deceptive Jamming; 3.4.8#Frequency Gate Pull Off; 3.4.9#Jamming Monopulse Radars; 3.4.10#Formation Jamming; 3.4.11#Formation Jamming with Range Denial; 3.4.12#Blinking. 3.4.13#Terrain Bounce3.4.14#Cross-Polarization Jamming; 3.4.15#Cross-Eye Jamming; References; 4 Next Generation Threat Radars; 4.1#Threat Radar Improvements; 4.2#Radar Electronic Protection Techniques; 4.2.1#Useful Resources; 4.2.2#Ultralow Side Lobes; 4.2.3#EW Impact of Reduced Side-Lobe Level; 4.2.4#Side-Lobe Cancellation; 4.2.5#Side-Lobe Blanking; 4.2.6#Monopulse Radar; 4.2.7#Cross-Polarization Jamming; 4.2.8#Anti-Cross-Polarization; 4.2.9#Chirped Radar; 4.2.10#Barker Code; 4.2.11#Range Gate Pull-Off; 4.2.12#AGC Jamming; 4.2.13#Noise-Jamming Quality. The fourth book in the bestselling Artech House EW 100 series is dedicated to reviewing legacy threats and discussing new threats which have arisen since Y2K in communications, radar, and IR threats. Like its predecessors, EW 104 presents a series of highly informative and easy-to-comprehend tutorials, along with insightful introductory and connective material that helps you understand how each aspect fits together. This reference starts with a review of the generalities of legacy threats, from the technical point of view, with a focus on what makes the new threats more challenging. Readers are. Electronics in military engineering. http://id.loc.gov/authorities/subjects/sh85042404 Electronic countermeasures. http://id.loc.gov/authorities/subjects/sh85042287 Contre-mesures électroniques. TECHNOLOGY & ENGINEERING Military Science. bisacsh Electronic countermeasures fast Electronics in military engineering fast Electronic book. has work: EW 104 (Text) https://id.oclc.org/worldcat/entity/E39PCH6r6VXJ9JyKGMMcCDpFDm https://id.oclc.org/worldcat/ontology/hasWork Print version: Adamy, David. EW 104 9781608078691 (DLC) 2015413595 (OCoLC)908411037 Artech House electronic warfare library. http://id.loc.gov/authorities/names/no2010127357 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1155202 Volltext |
spellingShingle | Adamy, David EW 104 : EW against a new generation of threats / Artech House electronic warfare library. EW 104: EW Against a New Generation of Threats; Contents; Preface; 1 Introduction; 2 Spectrum Warfare; 2.1#Changes in Warfare; 2.2#Some Specific Propagation Related Issues; 2.3#Connectivity; 2.3.1#The Most Basic Connectivity; 2.3.2#Connectivity Requirements; 2.3.3#Long-Range Information Transmission; 2.3.4#Information Fidelity; 2.4#Interference Rejection; 2.4.1#Spreading the Transmitted Spectrum; 2.4.2#Commercial FM Broadcast; 2.4.3#Military Spread Spectrum Signals; 2.5#Bandwidth Requirements for Information Transfer; 2.5.1#Data Transfer Without a Link; 2.5.2#Linked Data Transmission. 2.5.3#Software Location2.6#Distributed Military Capability; 2.6.1#Net-Centric Warfare; 2.7#Transmission Security Versus Message Security; 2.7.1#Transmission Security Versus Transmission Bandwidth; 2.7.2#Bandwidth Limitations; 2.8#Cyber Warfare Versus EW ; 2.8.1#Cyber Warfare; 2.8.2#Cyber Attacks; 2.8.3#Parallels Between Cyber Warfare and EW; 2.8.4#Difference Between Cyber Warfare and EW; 2.9#Bandwidth Trade-Offs ; 2.9.1#Bit-Error Critical Cases; 2.10#Error Correction Approaches; 2.10.1#Error Detection and Correction Codes; 2.10.2#Example of a Block Code. 2.10.3#Error Correction Versus Bandwidth2.11#EMS Warfare Practicalities; 2.11.1#Warfare Domains; 2.12#Steganography; 2.12.1#Steganography Versus Encryption; 2.12.2#Early Stenographic Techniques; 2.12.3#Digital Techniques; 2.12.4#How Does Steganography Relate to Spectrum Warfare?; 2.12.5#How Is Steganography Detected?; 2.13#Link Jamming ; 2.13.1#Communication Jamming; 2.13.2#Required J/S for Jamming Digital Signals; 2.13.3#Protections Against Link Jamming; 2.13.4#The Net Impact on Link Jamming ; 3 Legacy Radars; 3.1#Threat Parameters; 3.1.1#Typical Legacy Surface-to-Air Missile. 3.1.2#Typical Legacy Acquisition Radar3.1.3#Typical Anti-Aircraft Gun; 3.2#EW Techniques; 3.3#Radar Jamming ; 3.3.1#Jamming-to-Signal Ratio; 3.3.2#Self-Protection Jamming; 3.3.3#Remote Jamming; 3.3.4#Burn-Through Range; 3.4#Radar-Jamming Techniques; 3.4.1#Cover Jamming; 3.4.2#Barrage Jamming; 3.4.3#Spot Jamming; 3.4.4#Swept Spot Jamming; 3.4.5#Deceptive Jamming; 3.4.6#Range Deception Techniques; 3.4.7#Angle Deceptive Jamming; 3.4.8#Frequency Gate Pull Off; 3.4.9#Jamming Monopulse Radars; 3.4.10#Formation Jamming; 3.4.11#Formation Jamming with Range Denial; 3.4.12#Blinking. 3.4.13#Terrain Bounce3.4.14#Cross-Polarization Jamming; 3.4.15#Cross-Eye Jamming; References; 4 Next Generation Threat Radars; 4.1#Threat Radar Improvements; 4.2#Radar Electronic Protection Techniques; 4.2.1#Useful Resources; 4.2.2#Ultralow Side Lobes; 4.2.3#EW Impact of Reduced Side-Lobe Level; 4.2.4#Side-Lobe Cancellation; 4.2.5#Side-Lobe Blanking; 4.2.6#Monopulse Radar; 4.2.7#Cross-Polarization Jamming; 4.2.8#Anti-Cross-Polarization; 4.2.9#Chirped Radar; 4.2.10#Barker Code; 4.2.11#Range Gate Pull-Off; 4.2.12#AGC Jamming; 4.2.13#Noise-Jamming Quality. Electronics in military engineering. http://id.loc.gov/authorities/subjects/sh85042404 Electronic countermeasures. http://id.loc.gov/authorities/subjects/sh85042287 Contre-mesures électroniques. TECHNOLOGY & ENGINEERING Military Science. bisacsh Electronic countermeasures fast Electronics in military engineering fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85042404 http://id.loc.gov/authorities/subjects/sh85042287 |
title | EW 104 : EW against a new generation of threats / |
title_alt | EW against a new generation of threats |
title_auth | EW 104 : EW against a new generation of threats / |
title_exact_search | EW 104 : EW against a new generation of threats / |
title_full | EW 104 : EW against a new generation of threats / David L. Adamy. |
title_fullStr | EW 104 : EW against a new generation of threats / David L. Adamy. |
title_full_unstemmed | EW 104 : EW against a new generation of threats / David L. Adamy. |
title_short | EW 104 : |
title_sort | ew 104 ew against a new generation of threats |
title_sub | EW against a new generation of threats / |
topic | Electronics in military engineering. http://id.loc.gov/authorities/subjects/sh85042404 Electronic countermeasures. http://id.loc.gov/authorities/subjects/sh85042287 Contre-mesures électroniques. TECHNOLOGY & ENGINEERING Military Science. bisacsh Electronic countermeasures fast Electronics in military engineering fast |
topic_facet | Electronics in military engineering. Electronic countermeasures. Contre-mesures électroniques. TECHNOLOGY & ENGINEERING Military Science. Electronic countermeasures Electronics in military engineering Electronic book. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1155202 |
work_keys_str_mv | AT adamydavid ew104ewagainstanewgenerationofthreats AT adamydavid ewagainstanewgenerationofthreats |