Skip to content
You are not logged in |Login  

LEADER 00000cam a2200685Ii 4500 
001    ocn935983110 
003    OCoLC 
005    20170127063147.6 
006    m     o  d         
007    cr cnu---unuuu 
008    160125t20152015maua    ob    001 0 eng d 
019    949847070 
020    9781608078707|qelectronic book 
020    1608078701|qelectronic book 
020    |z9781608078691|q(hardback) 
020    |z1608078698|q(hardback) 
035    (OCoLC)935983110|z(OCoLC)949847070 
040    YDXCP|beng|erda|cYDXCP|dN$T|dOCLCF|dB24X7|dEBLCP|dCOO|dD6H
049    RIDW 
050  4 UG485|b.A33224 2015eb 
072  7 TEC|x025000|2bisacsh 
082 04 623/.043|223 
090    UG485|b.A33224 2015eb 
100 1  Adamy, David,|0https://id.loc.gov/authorities/names/
       n87865842|eauthor. 
245 10 EW 104 :|bEW against a new generation of threats /|cDavid 
       L. Adamy. 
246 30 EW against a new generation of threats 
264  1 Boston :|bArtech House,|c[2015] 
264  4 |c©2015 
300    1 online resource :|billustrations. 
336    text|btxt|2rdacontent 
336    still image|bsti|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
340    |gpolychrome|2rdacc 
347    text file|2rdaft 
490 1  The Artech House electronic warfare library 
504    Includes bibliographical references and index. 
505 0  EW 104: EW Against a New Generation of Threats; Contents; 
       Preface; 1 Introduction; 2 Spectrum Warfare; 2.1#Changes 
       in Warfare; 2.2#Some Specific Propagation Related Issues; 
       2.3#Connectivity; 2.3.1#The Most Basic Connectivity; 
       2.3.2#Connectivity Requirements; 2.3.3#Long-Range 
       Information Transmission; 2.3.4#Information Fidelity; 
       2.4#Interference Rejection; 2.4.1#Spreading the 
       Transmitted Spectrum; 2.4.2#Commercial FM Broadcast; 
       2.4.3#Military Spread Spectrum Signals; 2.5#Bandwidth 
       Requirements for Information Transfer; 2.5.1#Data Transfer
       Without a Link; 2.5.2#Linked Data Transmission 
505 8  2.5.3#Software Location2.6#Distributed Military 
       Capability; 2.6.1#Net-Centric Warfare; 2.7#Transmission 
       Security Versus Message Security; 2.7.1#Transmission 
       Security Versus Transmission Bandwidth; 2.7.2#Bandwidth 
       Limitations; 2.8#Cyber Warfare Versus EW ; 2.8.1#Cyber 
       Warfare; 2.8.2#Cyber Attacks; 2.8.3#Parallels Between 
       Cyber Warfare and EW; 2.8.4#Difference Between Cyber 
       Warfare and EW; 2.9#Bandwidth Trade-Offs ; 2.9.1#Bit-Error
       Critical Cases; 2.10#Error Correction Approaches; 
       2.10.1#Error Detection and Correction Codes; 
       2.10.2#Example of a Block Code 
505 8  2.10.3#Error Correction Versus Bandwidth2.11#EMS Warfare 
       Practicalities; 2.11.1#Warfare Domains; 
       2.12#Steganography; 2.12.1#Steganography Versus 
       Encryption; 2.12.2#Early Stenographic Techniques; 
       2.12.3#Digital Techniques; 2.12.4#How Does Steganography 
       Relate to Spectrum Warfare?; 2.12.5#How Is Steganography 
       Detected?; 2.13#Link Jamming ; 2.13.1#Communication 
       Jamming; 2.13.2#Required J/S for Jamming Digital Signals; 
       2.13.3#Protections Against Link Jamming; 2.13.4#The Net 
       Impact on Link Jamming ; 3 Legacy Radars; 3.1#Threat 
       Parameters; 3.1.1#Typical Legacy Surface-to-Air Missile 
505 8  3.1.2#Typical Legacy Acquisition Radar3.1.3#Typical Anti-
       Aircraft Gun; 3.2#EW Techniques; 3.3#Radar Jamming ; 
       3.3.1#Jamming-to-Signal Ratio; 3.3.2#Self-Protection 
       Jamming; 3.3.3#Remote Jamming; 3.3.4#Burn-Through Range; 
       3.4#Radar-Jamming Techniques; 3.4.1#Cover Jamming; 
       3.4.2#Barrage Jamming; 3.4.3#Spot Jamming; 3.4.4#Swept 
       Spot Jamming; 3.4.5#Deceptive Jamming; 3.4.6#Range 
       Deception Techniques; 3.4.7#Angle Deceptive Jamming; 
       3.4.8#Frequency Gate Pull Off; 3.4.9#Jamming Monopulse 
       Radars; 3.4.10#Formation Jamming; 3.4.11#Formation Jamming
       with Range Denial; 3.4.12#Blinking 
505 8  3.4.13#Terrain Bounce3.4.14#Cross-Polarization Jamming; 
       3.4.15#Cross-Eye Jamming; References; 4 Next Generation 
       Threat Radars; 4.1#Threat Radar Improvements; 4.2#Radar 
       Electronic Protection Techniques; 4.2.1#Useful Resources; 
       4.2.2#Ultralow Side Lobes; 4.2.3#EW Impact of Reduced Side
       -Lobe Level; 4.2.4#Side-Lobe Cancellation; 4.2.5#Side-Lobe
       Blanking; 4.2.6#Monopulse Radar; 4.2.7#Cross-Polarization 
       Jamming; 4.2.8#Anti-Cross-Polarization; 4.2.9#Chirped 
       Radar; 4.2.10#Barker Code; 4.2.11#Range Gate Pull-Off; 
       4.2.12#AGC Jamming; 4.2.13#Noise-Jamming Quality 
520    The fourth book in the bestselling Artech House EW 100 
       series is dedicated to reviewing legacy threats and 
       discussing new threats which have arisen since Y2K in 
       communications, radar, and IR threats. Like its 
       predecessors, EW 104 presents a series of highly 
       informative and easy-to-comprehend tutorials, along with 
       insightful introductory and connective material that helps
       you understand how each aspect fits together.This 
       reference starts with a review of the generalities of 
       legacy threats, from the technical point of view, with a 
       focus on what makes the new threats more challenging. 
       Readers are. 
588 0  Print version record. 
590    eBooks on EBSCOhost|bEBSCO eBook Subscription Academic 
       Collection - North America 
650  0 Electronics in military engineering.|0https://id.loc.gov/
       authorities/subjects/sh85042404 
650  0 Electronic countermeasures.|0https://id.loc.gov/
       authorities/subjects/sh85042287 
650  7 Electronics in military engineering.|2fast|0https://
       id.worldcat.org/fast/907609 
650  7 Electronic countermeasures.|2fast|0https://id.worldcat.org
       /fast/906940 
655  0 Electronic books. 
655  4 Electronic books. 
776 08 |iPrint version:|aAdamy, David, author.|tEW 104
       |z9781608078691|w(DLC)  2015413595|w(OCoLC)908411037 
830  0 Artech House electronic warfare library.|0https://
       id.loc.gov/authorities/names/no2010127357 
856 40 |uhttps://rider.idm.oclc.org/login?url=http://
       search.ebscohost.com/login.aspx?direct=true&scope=site&
       db=nlebk&AN=1155202|zOnline eBook. Access restricted to 
       current Rider University students, faculty, and staff. 
856 42 |3Instructions for reading/downloading this eBook|uhttp://
       guides.rider.edu/ebooks/ebsco 
901    MARCIVE 20231220 
948    |d20170505|cEBSCO|tebscoebooksacademic new|lridw 
994    92|bRID