In my government position I am responsible for military research and technology for the Italian armed forces. During my coordination work with the Western European Armament Group: Panel I1 (Research and Technology), discussions have often been of a highly technical nature. It is certainly easier to make management decisions with an adequate technical background, rather than having to grope with a poor knowledge of such technical issues. As a result, I support any effort that has the objective of promoting an understanding of the many facets of military technology within the international community of people in charge of armament matters.
Therefore, I greatly welcome Filippo Neri's easy and straightforward explanations on the most recent developments in the electronic defense field, from stealth technology to decoys, from electronic support measures (ESM) to advanced jamming techniques. In particular, the principles underlying low probability of intercept (LPI) threats, passive location techniques, the benefits afforded by advanced digital receivers, towed decoy jammers, new cross-eye jamming self-protection techniques, and high-power microwave weapons, have been illustrated in very simple terms.
This book illustrates the significant progress that electronic defense technology has made and is expected to achieve in the future with the advent of advanced integrated systems (e.g., multifunction W systems and direct energy weapons). The latter will not only represent effective aids to military operations, but also act as a deterrent to any likely conflicts. Moreover, the book describes how modern electronic defense systems operate and how they can be put to use in the military operations of today and tomorrow.
Digital Evidence and Computer Crime, Second Edition
Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.