The third book in the bestselling "Artech House EW 100" series is dedicated entirely to the practical aspects of electronic warfare against enemy communication. Like its predecessors, EW 103 presents a series of highly informative and easy-to-comprehend tutorials, along with insightful introductory and connective material that helps practitioners understand how each aspect fits together. From communications math, receiving systems, and signals, to communications emitter location, intercept, and jamming, this comprehensive volume covers all the key topics in the field.This title includes CD-ROM and Slide Rule! The CD-ROM contains time-saving formulas in spreadsheet format for the calculation of propagation losses, received signal strength, effective range, jamming to signal ratio and other important values. The book also comes packaged with a unique antenna and propagation slide rule for quick communication link calculations.
"A fascinating look at the new direction fuzzing technology is taking — useful for both QA engineers and bug hunters alike!"
–Dave Aitel, CTO, Immunity Inc.
Continue reading “Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)”
EW 101 has been a popular column in the Journal of Electronic Defense for a number of years. This compilation of tutorial articles from JED provides introductory level electronic warfare instruction for students of the discipline.
Serving as a continuation of the bestselling book EW 101: A First Course in Electronic Warfare, this new volume is a second book based on the popular tutorials featured in the Journal of Electronic Defense. Without delving into complex mathematics, this book lets you understand important concepts central to EW, so you gain a basic working knowledge of the technologies and techniques deployed in todayÂ’s EW systems.
This book describes modern technical tools that realize intentional remote destructives impacts to DPRs. It also discusses traditional passive means of protection, such as screened cabinets, filters, cables, special materials, covers, and advanced tools based on circuit- and hardware-based methods. It is the first book on the market to provide a detailed overview of the vulnerabilities of digital protection relays (DPRs) to natural and intentional destructive impacts, including cyber attacks and electromagnetism.