Search Results: 'Electronic Warfare'

Search

×
×
×
×
34 results for "Electronic Warfare"
The World of Electronic Warfare By Robert Macintosh
Paperback: List Price: $34.95 $27.96 | You Save: 20%
Prints in 3-5 business days
Welcome to the future of warfare - whether it be drones, satellite strikes, EMP or computer viruses, electronic warfare is here to stay. This comprehensive collection of articles will get you fully... More > up-to-date on this interesting, and fast-growing field while also reviewing what technologies helped get us to this point in history.< Less
Tactics and Techniques of Electronic Warfare By Bernard C. Nalty
Paperback: $19.95
Prints in 3-5 business days
The air campaign mounted against North Vietnam was the first time that an integrated air defense system based around radar-controlled guns and surface-to-air missiles had been encountered. ... More > Proponents of surface–to-air missiles had claimed that their lethality would drive manned aircraft from the battlefield. At first, the U.S. Air Force was hard-pressed to neutralize North Vietnam's radar-controlled defenses, but did prevail. Electronic countermeasures support for the air war against North Vietnam included stand-off jamming, Wild Weasel operations, the use of self protection pods, and the employment of chaff. Using all these techniques, Linebacker II saw the B-52s of Strategic Air Command facing the most effective air defense system the Soviet Union could provide. The B-52s won; the much-heralded surface-to-air missiles were scoring a lower kill rate than German defenses in World War Two. This campaign laid the foundations for the technology used by the USAF to neutralize enemy defenses ever since.< Less
Tactics and Techniques of Electronic Warfare In Vietnam By Stuart Slade, Bernard C. Nalty
eBook (ePub): $9.99
The air campaign mounted against North Vietnam between 1965 and 1972 was the first time that an integrated air defense system based around radar-controlled guns and surface-to-air missiles had been... More > encountered. Proponents of surface-to-air missiles had claimed that their lethality would drive manned aircraft from the battlefield. The U.S. Air Force was hard-pressed to neutralize North Vietnam's radar-controlled defenses, but did prevail and successfully delivered punishing blows during Operation Linebacker II in December 1972. Electronic countermeasures support for the air war against North Vietnam included stand-off jamming, Wild Weasel operations, the use of self-protection pods, and the employment of chaff. Using all these techniques, Linebacker II saw the B-52s of Strategic Air Command facing the most effective air defense system the Soviet Union could provide. The B-52s won; the much-heralded surface-to-air missiles were scoring a lower kill rate than German defenses in World War Two< Less
Electronic Warfare & Radar Systems Engineering Handbook By Naval Air Warfare Center Weapons Division
Paperback: $65.95
Prints in 3-5 business days
CONTENTS Mathematical Notation . Frequency Spectrum. Decibel (dB). Duty Cycle . Doppler Shift . Electronic Formulas . Missile and Electronic Equipment Designations. Radar Horizon / Line of Sight .... More > Propagation Time / Resolution . Modulation. Transforms / Wavelets. ANTENNAS- Antenna Introduction / Basics . Polarization. Radiation Patterns. Frequency / Phase Effects of Antennas . Antenna Near Field. Radiation Hazards. Active Electronically Scanned Arrays (AESA) . RADAR EQUATIONS Field Intensity and Power Density. Power Density . One-Way Radar Equation / RF Propagation. Two-Way Radar Equation (Monostatic) . Alternate Two-Way Radar Equation . Two-Way Radar Equation (Bistatic) . Jamming to Signal (J/S) Ratio - Constant Power [Saturated] Jamming. Burn-Through / Crossover Range. Support Jamming . Jamming to Signal (J/S) Ratio - Constant Gain [Linear] Jamming . Radar Cross Section (RCS) . Emission Control (EMCON) . EW Jamming Techniques . RADAR AND RECEIVER CHARACTERISTICS & TEST- RF Atmospheric Absorption...< Less
Coherent Madness: Effective Defense Against Covert Warfare By Mukazo Mukazo Vunda
eBook (PDF): $7.81
(3 Ratings)
Covert warfare to eliminate threats or research electronic, chemical and biological agents on unwitting, hapless civilians is becoming more widespread than ever before. A tax money supported network... More > of dedicated criminals for whom waging covert warfare is a way of life is on the increase, their job to punish by torture and eliminate people who pose a threat to those in positions of power. Intelligence agencies, there to protect citizens from internal and external foes, the judiciary, as well as the police forces, are heavily involved, giving the nod, protection, the best of their know-how and technology to the activity and those involved.< Less
Coherent Madness: Effective Defense Against Covert Warfare By Mukazo Mukazo Vunda
Paperback: $16.88
Prints in 3-5 business days
(3 Ratings)
Covert warfare to eliminate threats or research electronic, chemical and biological agents on unwitting, hapless civilians is becoming more widespread than ever before. A tax money supported network... More > of dedicated criminals for whom waging covert warfare is a way of life is on the increase, their job to punish by torture and eliminate people who pose a threat to those in positions of power. Intelligence agencies, there to protect citizens from internal and external foes, the judiciary, as well as the police forces, are heavily involved, giving the nod, protection, the best of their know-how and technology to the activity and those involved.< Less
Gå På - second edition - electronic version By Thomas Årnfelt
eBook (PDF): $6.21
An electronic version of the Gå På wargames rules. The rules cover early modern warfare from around 1700 to 1739, enabling players to collect armies and play games based on for example... More > the Great Northern War and the War of the Spanish Succession as well as various other conflicts such as the Jacobite rebellions or the Russo-Turkish war of 1711. Army lists are provided separately. Miniatures are required to play the game, as are dice and measuring devices.< Less
Grumman Prowler By peter dancey
eBook (ePub): $2.96
Now usurped by the Boeing F/A-18G Growler the Grumman Prowler served the USN carrier fleet for many years enhancing its capabilities and adding value to the safety and security of fleet combat air... More > defense types such as its Grumman F-14 Tomcat stablematep. It went through a number of enhanced capability upgrades this is a comprehensive overview of this very important USN combat plane< Less
Army Signals of South Africa By Walter Volker
Paperback: $56.00
Prints in 3-5 business days
This is impressive work of epic proportions and is arguably the primary reference work on army signals in South Africa. It is a compilation of some previously published material, but consists mainly... More > of new material never before published, large parts which have come from verbal recollections. It is the result of thorough and meticulous research, including over two hundred personal interviews ranging from generals to junior signaler to ensure a level of authenticity. The book consists of a chronological sweep of the history of land-based signals in South Africa, starting with the role of the British army signalers and those of the independent Boer Republics before and during the Boer War, through the two world wars, then on through its climax during the Border War (1966 to 1989), the involvement of Military Intelligence in setting up the first Electronic Warfare stations, through to the modern era. The book also contains a comprehensive overview of badges, flashes, mottoes, songs and traditions.< Less
Cyber Attack Threat Trends: Stuxnet By Harrison Dreggs, Ted Hobson, Xavier Hollenbeck
Paperback: List Price: $30.00 $18.00 | You Save: 40%
Prints in 3-5 business days
(2 Ratings)
An examination of cyber attack threat trends including Stuxnet. With background on advanced persistent threats, cyber electronic warfare, cyber security standards, cyber-attacks, cyberterrorism,... More > Operation High Roller, Operation Merlin, Operation Olympic Games, Siberian pipeline sabotage, Tailored Access Operations, and vulnerability of nuclear plants to attack.< Less