LEADER 05235nam 2200613 450 001 9910460380103321 005 20180613002904.0 010 $a1-5231-1717-6 010 $a1-60807-870-1 035 $a(CKB)3710000000570291 035 $a(EBL)1983119 035 $a(SSID)ssj0001623845 035 $a(PQKBManifestationID)16359940 035 $a(PQKBTitleCode)TC0001623845 035 $a(PQKBWorkID)12891601 035 $a(PQKB)11718358 035 $a(MiAaPQ)EBC1983119 035 $a(CaBNVSL)mat09100860 035 $a(IEEE)9100860 035 $a(EXLCZ)993710000000570291 100 $a20200729d2015 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aEW 104 $eEW against a new generation of threats /$fDavid L. Adamy 210 1$aBoston :$cArtech House,$d[2015] 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2015] 215 $a1 online resource (465 p.) 225 1 $aThe Artech House electronic warfare library 300 $aDescription based upon print version of record. 311 $a1-60807-869-8 320 $aIncludes bibliographical references and index. 327 $aEW 104: EW Against a New Generation of Threats; Contents; Preface; 1 Introduction; 2 Spectrum Warfare; 2.1#Changes in Warfare; 2.2#Some Specific Propagation Related Issues; 2.3#Connectivity; 2.3.1#The Most Basic Connectivity; 2.3.2#Connectivity Requirements; 2.3.3#Long-Range Information Transmission; 2.3.4#Information Fidelity; 2.4#Interference Rejection; 2.4.1#Spreading the Transmitted Spectrum; 2.4.2#Commercial FM Broadcast; 2.4.3#Military Spread Spectrum Signals; 2.5#Bandwidth Requirements for Information Transfer; 2.5.1#Data Transfer Without a Link; 2.5.2#Linked Data Transmission. 327 $a2.5.3#Software Location2.6#Distributed Military Capability; 2.6.1#Net-Centric Warfare; 2.7#Transmission Security Versus Message Security; 2.7.1#Transmission Security Versus Transmission Bandwidth; 2.7.2#Bandwidth Limitations; 2.8#Cyber Warfare Versus EW ; 2.8.1#Cyber Warfare; 2.8.2#Cyber Attacks; 2.8.3#Parallels Between Cyber Warfare and EW; 2.8.4#Difference Between Cyber Warfare and EW; 2.9#Bandwidth Trade-Offs ; 2.9.1#Bit-Error Critical Cases; 2.10#Error Correction Approaches; 2.10.1#Error Detection and Correction Codes; 2.10.2#Example of a Block Code. 327 $a2.10.3#Error Correction Versus Bandwidth2.11#EMS Warfare Practicalities; 2.11.1#Warfare Domains; 2.12#Steganography; 2.12.1#Steganography Versus Encryption; 2.12.2#Early Stenographic Techniques; 2.12.3#Digital Techniques; 2.12.4#How Does Steganography Relate to Spectrum Warfare?; 2.12.5#How Is Steganography Detected?; 2.13#Link Jamming ; 2.13.1#Communication Jamming; 2.13.2#Required J/S for Jamming Digital Signals; 2.13.3#Protections Against Link Jamming; 2.13.4#The Net Impact on Link Jamming ; 3 Legacy Radars; 3.1#Threat Parameters; 3.1.1#Typical Legacy Surface-to-Air Missile. 327 $a3.1.2#Typical Legacy Acquisition Radar3.1.3#Typical Anti-Aircraft Gun; 3.2#EW Techniques; 3.3#Radar Jamming ; 3.3.1#Jamming-to-Signal Ratio; 3.3.2#Self-Protection Jamming; 3.3.3#Remote Jamming; 3.3.4#Burn-Through Range; 3.4#Radar-Jamming Techniques; 3.4.1#Cover Jamming; 3.4.2#Barrage Jamming; 3.4.3#Spot Jamming; 3.4.4#Swept Spot Jamming; 3.4.5#Deceptive Jamming; 3.4.6#Range Deception Techniques; 3.4.7#Angle Deceptive Jamming; 3.4.8#Frequency Gate Pull Off; 3.4.9#Jamming Monopulse Radars; 3.4.10#Formation Jamming; 3.4.11#Formation Jamming with Range Denial; 3.4.12#Blinking. 327 $a3.4.13#Terrain Bounce3.4.14#Cross-Polarization Jamming; 3.4.15#Cross-Eye Jamming; References; 4 Next Generation Threat Radars; 4.1#Threat Radar Improvements; 4.2#Radar Electronic Protection Techniques; 4.2.1#Useful Resources; 4.2.2#Ultralow Side Lobes; 4.2.3#EW Impact of Reduced Side-Lobe Level; 4.2.4#Side-Lobe Cancellation; 4.2.5#Side-Lobe Blanking; 4.2.6#Monopulse Radar; 4.2.7#Cross-Polarization Jamming; 4.2.8#Anti-Cross-Polarization; 4.2.9#Chirped Radar; 4.2.10#Barker Code; 4.2.11#Range Gate Pull-Off; 4.2.12#AGC Jamming; 4.2.13#Noise-Jamming Quality. 330 $aThe fourth book in the bestselling Artech House EW 100 series is dedicated to reviewing legacy threats and discussing new threats which have arisen since Y2K in communications, radar, and IR threats. Like its predecessors, EW 104 presents a series of highly informative and easy-to-comprehend tutorials, along with insightful introductory and connective material that helps you understand how each aspect fits together. This reference starts with a review of the generalities of legacy threats, from the technical point of view, with a focus on what makes the new threats more challenging. Readers are. 410 0$aArtech House electronic warfare library. 517 3 $aEW against a new generation of threats 606 $aElectronics in military engineering 608 $aElectronic books. 615 0$aElectronics in military engineering. 676 $a623/.043 700 $aAdamy$b David$0536436 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910460380103321 996 $aEW 104$92027139 997 $aUNINA LEADER 00847nam a22002413i 4500 001 991002488199707536 005 20030702104638.0 008 030925s1975 it |||||||||||||||||ita 035 $ab12295735-39ule_inst 035 $aARCHE-034330$9ExL 040 $aBiblioteca Interfacoltà$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a709.45 100 1 $aMariotti, Mario$0446965 245 10$a(Fuori testo) /$cdi Mario Mariotti 260 $aFirenze :$bLa nuova Italia,$c1975 300 $a1 v. ;$c17 cm 440 3$aIl castoro 907 $a.b12295735$b02-04-14$c08-10-03 912 $a991002488199707536 945 $aLE002 Coll. 27.F.T.$g1$i2002000104991$lle002$o-$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i12690107$z08-10-03 996 $aFuori testo$9102926 997 $aUNISALENTO 998 $ale002$b08-10-03$cm$da $e-$fita$git $h0$i1 LEADER 03053 am 2200721 n 450 001 9910418016803321 005 20191104 010 $a979-1-03-654316-6 024 7 $a10.4000/books.larhra.2888 035 $a(CKB)4100000011314407 035 $a(FrMaCLE)OB-larhra-2888 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/63027 035 $a(PPN)248499092 035 $a(EXLCZ)994100000011314407 100 $a20200623j|||||||| ||| 0 101 0 $afre 135 $auu||||||m|||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 16$aLes « Matériaux Boulard » trente ans après. Des chiffres et des cartes... $eApproches sérielles et spatiales en histoire religieuse /$fChristian Sorrel 210 $a[S.I] $cLARHRA$d2019 215 $a1 online resource (195 p.) 311 $a979-1-0915-9202-4 330 $aLa publication en 2011 du dernier volume des « Matériaux pour l?histoire religieuse du peuple français », plus connus sous le nom de « Matériaux Boulard », et la journée d?étude organisée à cette occasion à l?Université de Lyon ont permis de mettre en lumière la figure trop ignorée du chanoine Fernand Boulard (1898-1977), pionnier de la sociologie religieuse pastorale. Il s?agissait dans le même temps de réfléchir à l?usage que les historiens ont fait des données qu?il avait collectées et pourront encore en faire à l?avenir, alors que les paradigmes historiographiques ont changé depuis la décennie 1970 qui vit le projet des « Matériaux Boulard » prendre forme. 517 $a« Matériaux Boulard » trente ans après. Des chiffres et des cartes... 606 $aReligion 606 $aHistory 606 $apratique religieuse 606 $adimorphisme sexuel 606 $ahistoire religieuse 606 $adéchristianisation 606 $afondement géographique 606 $asécularisation 610 $apratique religieuse 610 $afondement géographique 610 $ahistoire religieuse 610 $asécularisation 610 $adimorphisme sexuel 610 $adéchristianisation 615 4$aReligion 615 4$aHistory 615 4$apratique religieuse 615 4$adimorphisme sexuel 615 4$ahistoire religieuse 615 4$adéchristianisation 615 4$afondement géographique 615 4$asécularisation 700 $aAiriau$b Paul$01288718 701 $aChamp$b Nicolas$01304785 701 $aCuchet$b Guillaume$01290117 701 $aHenryot$b Fabienne$0998454 701 $aLanglois$b Claude$0154015 701 $aMartin$b Philippe$0200316 701 $aRousseau$b André$0395980 701 $aRousseau$b Louis$0645170 701 $aSorrel$b Christian$01081829 701 $aSorrel$b Christian$01081829 801 0$bFR-FrMaCLE 906 $aBOOK 912 $a9910418016803321 996 $aLes « Matériaux Boulard » trente ans après. Des chiffres et des cartes.$93039767 997 $aUNINA