Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sukhoi Su-27: Famous Russian Aircraft

Buy
In the late 1960s, the Soviet Union became aware that the U.S. was developing a new generation of jet fighters that had an exceptional range, heavy armor, and great agility in the air. These U.S. aircraft, the F-14 Tomcat, F-15 Eagle, F-16 Fighting Hornet, and F/A-18 Hornet dominated U.S. air power for three decades. In the context of the Cold War, the Soviets could not be seen to be lagging behind the Americans. Their response to these new U.S. aircraft was the Sukhoi Su-27 Flanker, which was designed as a long-range air superiority aircraft and interceptor.

The first of the modified pre-production aircraft appeared in 1981, but it was not until 1984 that significant numbers of the Su-27 started to enter service. Eventually some 680 Su-27 were built for the Soviets, of which 400 remain in service with the Russian Tactical Air Force today. Outside of Russia, the Su-27 is also in service with the Chinese, and on the inventories of the air forces of Vietnam, Malaysia, Ethiopia, Indonesia, Syria, and Angola.

This book describes in depth the development, operational career, history, and variants within the Su-27 family. The book incorporates color and black and white photos to portray some of the various camouflage schemes carried by the type in Soviet, Russian, and other air forces over the past two decades.

(HTML tags aren't allowed.)

Spotify For Dummies
Spotify For Dummies
T here’s no denying it: A revolution in how people consume music is well underway, and Spotify’s at the center of all the action. Just a decade ago, it was normal for people to wander into a music store and buy an artist’s CD after hearing a few catchy tracks on the radio or reading a few good newspaper...
Salesforce.com Secrets of Success: Best Practices for Growth and Profitability
Salesforce.com Secrets of Success: Best Practices for Growth and Profitability

Drive Better Productivity and Increase Saleswith Salesforce.com–Starting Now

 

Discover Real-World Best PracticesWithout Paying Expensive Consultants

 

Hacking VoIP: Protocols, Attacks, and Countermeasures
Hacking VoIP: Protocols, Attacks, and Countermeasures

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,...


Python Hacking Essentials
Python Hacking Essentials

Target Audience

  • This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I...
Innovations in Robot Mobility and Control (Studies in Computational Intelligence)
Innovations in Robot Mobility and Control (Studies in Computational Intelligence)

There exists quite a vast literature on mobile robots, covering fundamental principles on motion control and path-planning in indoor environments using ultrasonic/laser transducers. However, there is a scarcity of books/collective documents on vision based navigation of mobile robots and multi-agent systems. The book fills this gap and attempts...

The Concept of Number: From Quaternions to Monads and Topological Fields (Mathematics and Its Applications)
The Concept of Number: From Quaternions to Monads and Topological Fields (Mathematics and Its Applications)
This book consists of lectures that I have given, in Darmstadt since 1974, under various titles, for beginners or students of the third semester.

I have tried to concentrate on those themes concerning numbers, which seem to me to be the most important on essential and historical grounds, and which in my opinion
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy