325,43 €
361,59 €
-10% with code: EXTRA
Electronic Warfare in the Information Age
Electronic Warfare in the Information Age
325,43
361,59 €
  • We will send in 10–14 business days.
This is an advanced practitioner's guide to current concepts and threats associated with modern electronic warfare (EW). It identifies and explains the newest radar communications threats, and provides practical, how-to information on designing and implementing ECM and ECCM systems. The aim of the text is to help the reader develop ESM systems designed specifically to exploit the vulnerabilities of modern radar. It also identifies and evaluates ESM receiving equipment, and outlines advanced ECM…
361.59
  • SAVE -10% with code: EXTRA

Electronic Warfare in the Information Age (e-book) (used book) | bookbook.eu

Reviews

(4.12 Goodreads rating)

Description

This is an advanced practitioner's guide to current concepts and threats associated with modern electronic warfare (EW). It identifies and explains the newest radar communications threats, and provides practical, how-to information on designing and implementing ECM and ECCM systems. The aim of the text is to help the reader develop ESM systems designed specifically to exploit the vulnerabilities of modern radar. It also identifies and evaluates ESM receiving equipment, and outlines advanced ECM methods, including monopulse deception, coherent radar jamming, and high-ERP generation. Other sections cover modern ECCM countermeasure techniques, the impact of new stealth technology on ESM and ECM requirements, and jammer upgrading procedures.

EXTRA 10 % discount with code: EXTRA

325,43
361,59 €
We will send in 10–14 business days.

The promotion ends in 22d.16:21:45

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 3,62 Book Euros!?

This is an advanced practitioner's guide to current concepts and threats associated with modern electronic warfare (EW). It identifies and explains the newest radar communications threats, and provides practical, how-to information on designing and implementing ECM and ECCM systems. The aim of the text is to help the reader develop ESM systems designed specifically to exploit the vulnerabilities of modern radar. It also identifies and evaluates ESM receiving equipment, and outlines advanced ECM methods, including monopulse deception, coherent radar jamming, and high-ERP generation. Other sections cover modern ECCM countermeasure techniques, the impact of new stealth technology on ESM and ECM requirements, and jammer upgrading procedures.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)