Search Results for Secrecy. - Narrowed by: Online Library SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecrecy.$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026pe$003dd$00253A$0026ps$003d300? 2024-11-18T18:21:06Z Writing Secrecy in Caribbean Freemasonry ent://SD_ILS/0/SD_ILS:281219 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Arroyo, Jossianna.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=574970">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=574970</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The culture of secrecy Britain, 1832-1998 ent://SD_ILS/0/SD_ILS:231397 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Vincent, David, 1949-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Oxford scholarship online <a href="http://dx.doi.org/10.1093/acprof:oso/9780198203070.001.0001">http://dx.doi.org/10.1093/acprof:oso/9780198203070.001.0001</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secrecy, Covertness and Authentication in Wireless Communications Physical Layer Security Approach ent://SD_ILS/0/SD_ILS:520707 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Shen, Yulong. author.&#160;Zhang, Yuanyu. author.&#160;Jiang, Xiaohong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520707.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-38465-3">https://doi.org/10.1007/978-3-031-38465-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secrecy's power covert Shin Buddhists in Japan and contradictions of concealment ent://SD_ILS/0/SD_ILS:323687 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Chilson, Clark, 1967- author.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(323687.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780824851347/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secrecy in the sunshine era the promise and failures of U.S. open government laws ent://SD_ILS/0/SD_ILS:323968 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Arnold, Jason Ross, author.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(323968.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780700620425/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secrecy and insurgency socialities and knowledge practices in Guatemala ent://SD_ILS/0/SD_ILS:322433 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Posocco, Silvia.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE(322433.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780817386986/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Banking secrecy and offshore financial centres money laundering and offshore banking ent://SD_ILS/0/SD_ILS:344511 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Young, Mary Alice.<br/>Preferred Shelf Number&#160;ONLINE(344511.1)<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203076033">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The covert sphere : secrecy, fiction, and the national security state ent://SD_ILS/0/SD_ILS:376897 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Melley, Timothy, 1963-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.7591/j.cttn34zt">http://www.jstor.org/stable/10.7591/j.cttn34zt</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Abuse of power how Cold War surveillance and secrecy policy shaped the response to 9/11 ent://SD_ILS/0/SD_ILS:244041 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Theoharis, Athan G.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781439906668/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Back channel negotiation secrecy in the Middle East peace process ent://SD_ILS/0/SD_ILS:244932 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Wanis-St. John, Anthony&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9780815651079/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secrecy and the media the official history of the United Kingdom's D-notice system ent://SD_ILS/0/SD_ILS:264984 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Wilkinson, Nicholas, 1941-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203876459">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes the guide to secrecy from ancient to modern times ent://SD_ILS/0/SD_ILS:284865 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Mollin, Richard A., 1947-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420035087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Reflecting Surface-Aided Physical-Layer Security ent://SD_ILS/0/SD_ILS:520702 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Shu, Feng. author.&#160;Wang, Jiangzhou. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520702.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-41812-9">https://doi.org/10.1007/978-3-031-41812-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial Networks and Intelligent Systems 9th EAI International Conference, INISCOM 2023, Ho Chi Minh City, Vietnam, August 2-3, 2023, Proceedings ent://SD_ILS/0/SD_ILS:520724 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Vo, Nguyen-Son. editor.&#160;Tran, Hoai-An. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520724.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47359-3">https://doi.org/10.1007/978-3-031-47359-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521356 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Athanasopoulos, Elias. editor.&#160;Mennink, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(521356.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-49187-0">https://doi.org/10.1007/978-3-031-49187-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Algorithms, Systems, and Applications 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings ent://SD_ILS/0/SD_ILS:518831 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Xu, Kuai. editor.&#160;Zhu, Haojin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(518831.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-21837-3">https://doi.org/10.1007/978-3-319-21837-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings ent://SD_ILS/0/SD_ILS:519325 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Akram, Raja Naeem. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519325.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24018-3">https://doi.org/10.1007/978-3-319-24018-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lure of the arcane the literature of cult and conspiracy ent://SD_ILS/0/SD_ILS:241138 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Ziolkowski, Theodore.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781421409597/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Commonsense anticommunism labor and civil liberties between the world wars ent://SD_ILS/0/SD_ILS:239385 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Luff, Jennifer.&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781469601717/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Terrorism and counter-intelligence : how terrorist groups elude detection ent://SD_ILS/0/SD_ILS:377287 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Mobley, Blake W.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.7312/mobl15876">http://www.jstor.org/stable/10.7312/mobl15876</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Heidegger and unconcealment truth, language, and history ent://SD_ILS/0/SD_ILS:278431 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Wrathall, Mark A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=347849">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=347849</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bureau of missing persons : writing the secret lives of fathers ent://SD_ILS/0/SD_ILS:375618 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Porter, Roger J., 1936-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.7591/j.ctt7zk1f">http://www.jstor.org/stable/10.7591/j.ctt7zk1f</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Revolutionary brotherhood : Freemasonry and the transformation of the American social order, 1730-1840 ent://SD_ILS/0/SD_ILS:374905 2024-11-18T18:21:06Z 2024-11-18T18:21:06Z Author&#160;Bullock, Steven C.&#160;Institute of Early American History and Culture (Williamsburg, Va.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.5149/9780807899854_bullock">http://www.jstor.org/stable/10.5149/9780807899854_bullock</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>