Author: Martin Streetly
Publisher: Janes Information Group
Release Date: 2005
This comprehensive guide covers the whole spectrum of surveillance, identification, targeting, control, intelligence gathering and self-protection systems - for land, sea, air and space applications. Each entry contains technical descriptions on the role, format and capabilities, status and specifications of each system, clearly resented for ease of comparison and evaluation. Also includes contractor details to support your procurement and market intelligence requirements. Key contents include: Radar Systems; Fire-control; Surveillance; Navigation; Missile control air defence; IFF and secondary surveillance; Land-based, airborne and naval; Military air traffic control Electronic Warfare Systems; ELINT; COMINT; ECM; Defensive Aids Suites (DAS); Land-based, naval and airborne A subscription to Jane's Radar and Electronic Warfare Systems online not only gives you all of the above with search functionality and a minimum of five-years archive, it also includes monthly updates to ensure you have the latest information available.
Author: Andew Erickson
Publisher: Naval Institute Press
Release Date: 2012-04-30
China's aircraft carrier program is making major waves well before the first ship has been completed. Undoubtedly, this development heralds a new era in Chinese national security policy. While the present volume presents substantial new insight on that particular question, its focus is decidedly broader in scope. Chinese Aerospace Power offers a comprehensive survey of Chinese aerospace developments, with a focus on areas of potential strategic significance previously unexplored in Western scholarship. The book also links these developments to the vast maritime battlespace of the Asia-Pacific region and highlights the consequent implications for the U.S. military, particularly the U.S. Navy.
Author: Phillip E. Pace
Publisher: Artech House
Release Date: 2009
Genre: Technology & Engineering
This revised and expanded second edition brings you to the cutting edge with new chapters on LPI radar design, including over-the-horizon radar, random noise radar, and netted LPI radar. You also discover critical LPI detection techniques, parameter extraction signal processing techniques, and anti-radiation missile design strategies to counter LPI radar.
Author: Nicholas J. Willis
Publisher: SciTech Publishing
Release Date: 2007-01-01
Genre: Technology & Engineering
Advances in Bistatic Radar updates and extends bistatic and multistatic radar developments since the publication of Willis' Bistatic Radar in 1991. New and recently declassified military applications are documented, civil applications are detailed including commercial and scientific systems and leading radar engineers provide expertise to each of these applications. Advances in Bistatic Radar consists of two major sections: Bistatic/Multistatic Radar Systems and Bistatic Clutter and Signal Processing. Starting with a history update, the first section documents the early and now declassified military AN/FPS-23 Fluttar DEW-Line Gap-filler, and high frequency (HF) bistatic radars developed for missile attack warning. It then documents the recently developed passive bistatic and multistatic radars exploiting commercial broadcast transmitters for military and civilian air surveillance. Next, the section documents scientific bistatic radar systems for planetary exploration, which have exploited data link transmitters over the last forty years; ionospheric measurements, again exploiting commercial broadcast transmitters; and 3-D wind field measurements using a bistatic receiver hitchhiking off doppler weather radars. This last application has been commercialized. The second section starts by documenting the full, unclassified bistatic clutter scattering coefficient data base, along with the theory and analysis supporting its development. The section then details two major clutter-related developments, spotlight bistatic synthetic aperture radar (SAR), which can now generate high resolution images using bistatic autofocus and related techniques; and adaptive moving target indication (MTI), which allows cancellation of nonstationary clutter generated by moving (i.e. airborne) platforms through the use of bistatic space-time adaptive processing (STAP).
Author: C. Wills
Release Date: 2016-04-29
Genre: Business & Economics
Control of the air is the foundation for all conventional military operations against an adversary with an air defence capability. In future warfare, will it be possible for Unmanned Combat Air Systems to undertake the tasks and accept most of the risks that, until now, have been the lot of military aviators?
Author: William Hagestad II
Publisher: IT Governance Ltd
Release Date: 2012-03-05
Genre: Computer hackers
21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical and linguistic sources, as well as the author's personal experience, to attempt to explain China to the uninitiated. The objective of the book is to present the salient information regarding the use of cyber warfare doctrine by the People's Republic of China to promote its own interests and enforce its political, military and economic will on other nation states. The threat of Chinese Cyberwarfare can no longer be ignored. It is a clear and present danger to the experienced and innocent alike and will be economically, societally and culturally changing and damaging for the nations that are targeted.
Author: Jane Mayer
Release Date: 2009-05-08
The Dark Side is a dramatic, riveting, and definitive narrative account of how the United States made self-destructive decisions in the pursuit of terrorists around the world—decisions that not only violated the Constitution, but also hampered the pursuit of Al Qaeda. In spellbinding detail, Jane Mayer relates the impact of these decisions by which key players, namely Vice President Dick Cheney and his powerful, secretive adviser David Addington, exploited September 11 to further a long held agenda to enhance presidential powers to a degree never known in U.S. history, and obliterate Constitutional protections that define the very essence of the American experiment. With a new afterward. One of The New York Times 10 Best Books of the Year National Bestseller National Book Critics Circle Award Finalist A Best Book of the Year: Salon, Slate, The Economist, The Washington Post, Cleveland Plain-Dealer
Author: Frederick Thomas Jane
Release Date: 2009
The authority on aircraft under development or in production This unparalleled reference to the world's aircraft provides you with independent cataloguing of all known powered aircraft under development or in production worldwide.
Author: Michele Nones
Publisher: Edizioni Nuova Cultura
Release Date: 2012
Genre: Technology & Engineering
Information technology (IT) has had, and will continue to have, a deep impact on the defence sector. The most advanced countries, not only the U.S. but also France, Great Britain and Italy, over the past few years have undergone a transormation of their armed forces aimed at exploiting the strategic advantages of IT. The goal pursued in Europe, and also promoted by NATO, is Network Enabled Capability (NEC). That is combining equipment and soldiers, as well as different doctrinal, procedural, technical and organizational elements, into a single network to obtain their interaction in order to achieve substantial strategic superiority. In practice, this also occurs with a strong, efficient and secure telecommunications network, and through netcentric modernization of armed forces' capability and systems aimed at connecting them to the net. This research paper analyzes the military netcentric modernization and transformation programs - still in progress - in France, Britain and Italy, with special focus on the joint program led by the Italian army called "Forza NEC". Opportunities and challenges of "Forza NEC" have been considered according to the Italian armed force's requirements, developed during two decades of experience in international military operations, as well as in the light of the evolution of strategic doctrine at a European and transatlantic level. Particular attention has been devoted to the interaction between industry and the armed forces, and to the involvement of many Italian companies in different "Forza NEC" activities, as it represents one of the pillars of the procurement program.
This is a print on demand edition of a hard to find publication. The proposed FY 2010 defense budget requests $1,859.5 million for the Aegis Ballistic Missile Defense (BMD) program. The issue for Congress discussed in this report is: What should be the role of sea-based systems in U.S. ballistic missile defense, and are DoD¿s programs for sea-based BMD capabilities appropriately structured and funded? Potential issues for Congress re: sea-based BMD systems include the number of SM-3 interceptors planned for procurement, whether development of a far-term sea-based terminal defense BMD capability should be accelerated, technical risk in the Aegis BMD program, the number of Aegis BMD ships, and the role of Aegis BMD in European missile defense. Illustrations.