Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
49,525
result(s) for
"SECRET"
Sort by:
The rook : a novel
A high-ranking member of a secret organization that battles supernatural forces wakes up in a London park with no memory, no idea who she is, and with a letter that provides instructions to help her uncover a far-reaching conspiracy.
The history of the Stasi
2014
The East German Ministry for State Security stood for Stalinist oppression and all-encompassing surveillance. The \"shield and sword of the party,\" it secured the rule of the Communist Party for more than forty years, and by the 1980s it had become the largest secret-police apparatus in the world, per capita. Jens Gieseke tells the story of the Stasi, a feared secret-police force and a highly professional intelligence service. He inquires into the mechanisms of dictatorship and the day-to-day effects of surveillance and suspicion. Masterful and thorough at once, he takes the reader through this dark chapter of German postwar history, supplying key information on perpetrators, informers, and victims. In an assessment of post-communist memory politics, he critically discusses the consequences of opening the files and the outcomes of the Stasi debate in reunified Germany. A major guide for research on communist secret-police forces, this book is considered the standard reference work on the Stasi and has already been translated into a number of Eastern European languages.
Kingdom hearts 358/2 days : the novel
After the Organization tells her to look after a mysterious stranger, Roxas spends many meaningful days with this new Nobody whose face and body is hidden by a hood.
Secret Leviathan
2023
The Soviet Union was one of the most secretive states that ever
existed. Defended by a complex apparatus of rules and checks
administered by the secret police, the Soviet state had seemingly
unprecedented capabilities based on its near monopoly of productive
capital, monolithic authority, and secretive decision making. But
behind the scenes, Soviet secrecy was double-edged: it raised
transaction costs, incentivized indecision, compromised the
effectiveness of government officials, eroded citizens' trust in
institutions and in each other, and led to a secretive society and
an uninformed elite. The result is what this book calls the
secrecy/capacity tradeoff: a bargain in which the Soviet state
accepted the reduction of state capacity as the cost of ensuring
its own survival.
This book is the first comprehensive, analytical, multi-faceted
history of Soviet secrecy in the English language. Harrison
combines quantitative and qualitative evidence to evaluate the
impact of secrecy on Soviet state capacity from the 1917 Bolshevik
Revolution to the collapse of the Soviet Union in 1991. Based on
multiple years of research in once-secret Soviet-era archives, this
book addresses two gaps in history and social science: one the core
role of secrecy in building and stabilizing the communist states of
the twentieth century; the other the corrosive effects of secrecy
on the capabilities of authoritarian states.
U.S. secret service
by
Larson, Kirsten W., author
in
Secret service United States Juvenile literature.
,
Secret service.
2017
\"This photo-illustrated book describes the life of a US Secret Service agents, including their work catching counterfeiters and protecting the president of the United States. Describes training required to be an agent and what a day in the life is like in the field\"-- Provided by publisher.
Cargo of Lies
2015,1996
Beeby argues that Canadian authorities were woefully unprepared for the subtleties of wartime counter-espionage, and that their mishandling of the case had long-term consequences that affected relations with their intelligence partners throughout the Cold War.
I spy the Illuminati eye : what's the big secret?
by
Keenan, Sheila, author
in
Illuminati Juvenile literature.
,
Secret societies Juvenile literature.
,
Illuminati.
2018
\"This irreverent, illustrated guide takes a look with an all-seeing, skeptical eye at the history and mystery of the cultural phenomenon that's got middle-school kids flashing finger triangles and scrutinizing dollar bills for signs of the Illuminati\"-- Provided by publisher.
Richard Sorge, the GRU and the Pacific War
2020,2022,2025
Sorge's activities between 1930 and 1942 have tended to be lauded as those of a superlative human intelligence operator and the Soviet Union's GRU (Soviet military intelligence unit) as the optimum of spy-masters.
Stiletto : a novel
\"When two secret organization are forced to merge after years of enmity and bloodshed, only one person has the fearsome powers -- and the bureaucratic finesse -- to get the job done. Rook Myfanwy Thomas must broker a deal between two bitter adversaries: the Checquy, a centuries-old cover organization that protects Britain from supernatural threats, and... the Grafters, a supernatural threat. But as bizarre attacks sweep London and threaten negotiations, old hatreds flare. Surrounded by spies, only Myfanwy and two women who absolutely loathe each other can seek out the culprits before they trigger a devestating otherworldly war.\" --P.4 of cover.
Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing
2023
This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting‐based secret sharing. The trustfulness of shares utilised secret‐sharing as an applicable privacy creation tool for the authentication of real‐life complex platforms. This research adjusts embedding the watermarking data over the images by innovative redistribution of shares to be embedded spread over all the images. The anticipated watermarking technique guaranteed to scatter the share bits implanting at different least significant bits of image pixels as boosting up the trust overall authentication practicality. The paper experimentation performance analysis shows that this improved image watermarking authentication (capacity) is averagely better by 33%–67% than other related exclusive‐OR oriented and octagon approaches. Interestingly, these measurement improvements did not degrade the robustness and security of the system, inspiring our research for opening novel track of related future counting‐based secret‐sharing authentication progresses to come.
Journal Article