Home > Industry/Domain > Military > Missile defense
Missile defense
Measures designed to detect, identify, track, and defeat attacking (ballistic) missiles in both strategic and theater tactical roles, during any portion of their flight trajectory (boost, post-boost, midcourse, or terminal) or to nullify or reduce the effectiveness of such attack.
Industry: Military
Add a new termContributors in Missile defense
Missile defense
large optics
Military; Missile defense
The technology of constructing and employing mirrors over 1 m aperture to direct and control high power beam weapons/systems with large coverage, or to provide high resolution or high sensitivity for ...
control zone
Military; Missile defense
The space, expressed in feet or radius, that surrounds equipment that is used to process sensitive defense information and that is under sufficient physical and technical control to preclude an ...
trusted path
Military; Missile defense
A mechanism by which a person at a terminal can communicate directly with the Trusted Computing Base. This mechanism can only be activated by the person of the Trusted Computing Base and cannot be ...
attack price
Military; Missile defense
A concept used to evaluate the performance of a BMD system that defines “price” as the number of RVs required to ensure target destruction. Target destruction is defined as a probability of target ...
beam control
Military; Missile defense
Technologies associated with controlling the physical properties of high energy beams and steering the energy transmitted by those beams to the target vehicle; also, the management of signal or image ...
base program
Military; Missile defense
The base program is the program described in the Future Years Defense Program base file, when updated to conform to the budget presented to Congress in January. It constitutes the base from which all ...
trojan horse
Military; Missile defense
A computer program with an apparently or actually useful function that contains additional (hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the ...
Featured blossaries
2la
0
Terms
16
Blossaries
4
Followers
10 Countries That Dont Officially Exist
vhanedelgado
0
Terms
15
Blossaries
7
Followers