000 | 06605cam a2200757Ii 4500 | ||
---|---|---|---|
001 | ocn935983110 | ||
003 | OCoLC | ||
005 | 20200827111911.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 160125t20152015maua ob 001 0 eng d | ||
040 |
_aYDXCP _beng _erda _epn _cYDXCP _dN$T _dOCLCF _dB24X7 _dEBLCP _dCOO _dD6H _dAGLDB _dNRC _dICA _dDEBSZ _dOCLCQ _dK6U _dVTS _dVLB _dSTF _dMERER _dCUY _dCEF _dERL _dOCLCQ _dLVT _dKNOVL _dAU@ _dM8D _dUKAHL _dZCU _dOCLCQ |
||
019 | _a949847070 | ||
020 |
_a9781608078707 _q(electronic bk.) |
||
020 |
_a1608078701 _q(electronic bk.) |
||
020 |
_a9781523117178 _q(electronic bk.) |
||
020 |
_a1523117176 _q(electronic bk.) |
||
020 |
_z9781608078691 _q(hardback) |
||
020 |
_z1608078698 _q(hardback) |
||
029 | 1 |
_aDEBSZ _b484760904 |
|
029 | 1 |
_aAU@ _b000057214274 |
|
035 |
_a(OCoLC)935983110 _z(OCoLC)949847070 |
||
050 | 4 |
_aUG485 _b.A33224 2015eb |
|
072 | 7 |
_aTEC _x025000 _2bisacsh |
|
082 | 0 | 4 |
_a623/.043 _223 |
049 | _aMAIN | ||
100 | 1 |
_aAdamy, David, _eauthor. _0http://id.loc.gov/authorities/names/n87865842 |
|
245 | 1 | 0 |
_aEW 104 : _bEW against a new generation of threats / _cDavid L. Adamy. |
246 | 3 | 0 | _aEW against a new generation of threats |
264 | 1 |
_aBoston : _bArtech House, _c[2015] |
|
264 | 4 | _c�2015 | |
300 |
_a1 online resource : _billustrations. |
||
336 |
_atext _btxt _2rdacontent |
||
336 |
_astill image _bsti _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aThe Artech House electronic warfare library | |
588 | 0 | _aPrint version record. | |
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aEW 104: EW Against a New Generation of Threats; Contents; Preface; 1 Introduction; 2 Spectrum Warfare; 2.1#Changes in Warfare; 2.2#Some Specific Propagation Related Issues; 2.3#Connectivity; 2.3.1#The Most Basic Connectivity; 2.3.2#Connectivity Requirements; 2.3.3#Long-Range Information Transmission; 2.3.4#Information Fidelity; 2.4#Interference Rejection; 2.4.1#Spreading the Transmitted Spectrum; 2.4.2#Commercial FM Broadcast; 2.4.3#Military Spread Spectrum Signals; 2.5#Bandwidth Requirements for Information Transfer; 2.5.1#Data Transfer Without a Link; 2.5.2#Linked Data Transmission. | |
505 | 8 | _a2.5.3#Software Location2.6#Distributed Military Capability; 2.6.1#Net-Centric Warfare; 2.7#Transmission Security Versus Message Security; 2.7.1#Transmission Security Versus Transmission Bandwidth; 2.7.2#Bandwidth Limitations; 2.8#Cyber Warfare Versus EW ; 2.8.1#Cyber Warfare; 2.8.2#Cyber Attacks; 2.8.3#Parallels Between Cyber Warfare and EW; 2.8.4#Difference Between Cyber Warfare and EW; 2.9#Bandwidth Trade-Offs ; 2.9.1#Bit-Error Critical Cases; 2.10#Error Correction Approaches; 2.10.1#Error Detection and Correction Codes; 2.10.2#Example of a Block Code. | |
505 | 8 | _a2.10.3#Error Correction Versus Bandwidth2.11#EMS Warfare Practicalities; 2.11.1#Warfare Domains; 2.12#Steganography; 2.12.1#Steganography Versus Encryption; 2.12.2#Early Stenographic Techniques; 2.12.3#Digital Techniques; 2.12.4#How Does Steganography Relate to Spectrum Warfare?; 2.12.5#How Is Steganography Detected?; 2.13#Link Jamming ; 2.13.1#Communication Jamming; 2.13.2#Required J/S for Jamming Digital Signals; 2.13.3#Protections Against Link Jamming; 2.13.4#The Net Impact on Link Jamming ; 3 Legacy Radars; 3.1#Threat Parameters; 3.1.1#Typical Legacy Surface-to-Air Missile. | |
505 | 8 | _a3.1.2#Typical Legacy Acquisition Radar3.1.3#Typical Anti-Aircraft Gun; 3.2#EW Techniques; 3.3#Radar Jamming ; 3.3.1#Jamming-to-Signal Ratio; 3.3.2#Self-Protection Jamming; 3.3.3#Remote Jamming; 3.3.4#Burn-Through Range; 3.4#Radar-Jamming Techniques; 3.4.1#Cover Jamming; 3.4.2#Barrage Jamming; 3.4.3#Spot Jamming; 3.4.4#Swept Spot Jamming; 3.4.5#Deceptive Jamming; 3.4.6#Range Deception Techniques; 3.4.7#Angle Deceptive Jamming; 3.4.8#Frequency Gate Pull Off; 3.4.9#Jamming Monopulse Radars; 3.4.10#Formation Jamming; 3.4.11#Formation Jamming with Range Denial; 3.4.12#Blinking. | |
505 | 8 | _a3.4.13#Terrain Bounce3.4.14#Cross-Polarization Jamming; 3.4.15#Cross-Eye Jamming; References; 4 Next Generation Threat Radars; 4.1#Threat Radar Improvements; 4.2#Radar Electronic Protection Techniques; 4.2.1#Useful Resources; 4.2.2#Ultralow Side Lobes; 4.2.3#EW Impact of Reduced Side-Lobe Level; 4.2.4#Side-Lobe Cancellation; 4.2.5#Side-Lobe Blanking; 4.2.6#Monopulse Radar; 4.2.7#Cross-Polarization Jamming; 4.2.8#Anti-Cross-Polarization; 4.2.9#Chirped Radar; 4.2.10#Barker Code; 4.2.11#Range Gate Pull-Off; 4.2.12#AGC Jamming; 4.2.13#Noise-Jamming Quality. | |
520 | _aThe fourth book in the bestselling Artech House EW 100 series is dedicated to reviewing legacy threats and discussing new threats which have arisen since Y2K in communications, radar, and IR threats. Like its predecessors, EW 104 presents a series of highly informative and easy-to-comprehend tutorials, along with insightful introductory and connective material that helps you understand how each aspect fits together. This reference starts with a review of the generalities of legacy threats, from the technical point of view, with a focus on what makes the new threats more challenging. Readers are. | ||
590 |
_aeBooks on EBSCOhost _bEBSCO eBook Subscription Academic Collection - Worldwide |
||
650 | 0 |
_aElectronics in military engineering. _0http://id.loc.gov/authorities/subjects/sh85042404 |
|
650 | 0 |
_aElectronic countermeasures. _0http://id.loc.gov/authorities/subjects/sh85042287 |
|
650 | 7 |
_aTECHNOLOGY & ENGINEERING _xMilitary Science. _2bisacsh |
|
650 | 7 |
_aElectronic countermeasures. _2fast _0(OCoLC)fst00906940 |
|
650 | 7 |
_aElectronics in military engineering. _2fast _0(OCoLC)fst00907609 |
|
650 | 7 |
_aMilitary & Naval Science. _2hilcc |
|
650 | 7 |
_aLaw, Politics & Government. _2hilcc |
|
650 | 7 |
_aMilitary Engineering. _2hilcc |
|
655 | 4 | _aElectronic books. | |
655 | 0 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _aAdamy, David. _tEW 104 _z9781608078691 _w(DLC) 2015413595 _w(OCoLC)908411037 |
830 | 0 |
_aArtech House electronic warfare library. _0http://id.loc.gov/authorities/names/no2010127357 |
|
856 | 4 | 0 | _uhttps://libproxy.firstcity.edu.my:8443/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1155202 |
938 |
_aAskews and Holts Library Services _bASKH _nAH30683824 |
||
938 |
_aBooks 24x7 _bB247 _nbke00111999 |
||
938 |
_aProQuest Ebook Central _bEBLB _nEBL1983119 |
||
938 |
_aEBSCOhost _bEBSC _n1155202 |
||
938 |
_aYBP Library Services _bYANK _n12810357 |
||
994 |
_a92 _bMYFCU |
||
999 |
_c50038 _d50038 |