Crime prevention -- ScotlandSee also what's at your library, or elsewhere.
Broader terms:Narrower term: |
Filed under: Crime prevention -- Scotland -- Strathclyde
Items below (if any) are from related and broader terms.
Filed under: Crime prevention
Filed under: Vigilance committees -- MexicoFiled under: Vigilance committees -- Montana- The Devil Learns to Vote: The Story of Montana (New York: Covici, Friede, c1938), by C. P. Connolly (page images at HathiTrust)
- The Vigilantes of Montana: or, Popular Justice in the Rocky Mountains (Virginia City, MT: Montana Post Press, 1866), by Thos. J. Dimsdale (page images at HathiTrust)
- The Vigilantes of Montana: or, Popular Justice in the Rocky Mountains (fourth edition, with Noyes's History of Southern Montana; Helena: State Pub. Co., n.d.), by Thos. J. Dimsdale, contrib. by Alva Josiah Noyes (multiple formats at archive.org)
Filed under: Vigilance committees -- Montana -- History- Vigilante Days and Ways (Chicago: A. C. McClurg and Co., 1912), by Nathaniel Pitt Langford
Filed under: Vigilance committees -- Montana -- History -- 19th centuryFiled under: Vigilance committees -- United StatesFiled under: Crime prevention -- South Africa -- Citizen participationFiled under: Crime prevention -- United States -- Citizen participation
Filed under: Crime prevention -- United States -- Citizen participation -- HistoryFiled under: Crime prevention -- Cross-cultural studiesFiled under: Crime prevention -- England
Filed under: Crime prevention -- England -- HartlepoolFiled under: Crime prevention -- Great BritainFiled under: Crime prevention -- Mexico- Making Things Stick: Surveillance Technologies and Mexico's War on Crime (Oakland, CA: University of California Press, c2016), by Keith Guzik
Filed under: Crime prevention -- New York (State) -- New York
Filed under: Crime prevention -- United States -- Periodicals
Filed under: Crime prevention -- Research -- United States- Family Life, Delinquency, and Crime, A Policymaker's Guide: Research Summary (Washington: U.S. Dept. of Justice, Office of Justice Programs, Office of Juvenile Justice and Delinquency Prevention, 1994), by Kevin N. Wright and Karen E. Wright (page images at HathiTrust)
- Preventing Crime: What Works, What Doesn't, What's Promising, by Lawrence W. Sherman, Denise C. Gottfredson, Doris L. MacKenzie, John Eck, Peter Reuter, and Shawn Bushway (HTML at ncjrs.gov)
Filed under: Crime prevention -- South Africa -- Cape TownFiled under: Crime prevention -- United States
Filed under: Crime prevention -- United States -- EvaluationFiled under: Gang prevention -- United StatesFiled under: Punishment in crime deterrence -- United StatesFiled under: Burglary protection
Filed under: Locks and keys
Filed under: Locks and keys -- Catalogs- Locks and Hardware (catalog #22; Stamford, CT: Yale and Towne Mfg. Co., c1917), by Yale & Towne Manufacturing Company
Filed under: Locks and keys -- Juvenile fiction
Filed under: Locksmiths -- Fiction- Barnaby Rudge, by Charles Dickens
Filed under: Security systems -- Mexico- Making Things Stick: Surveillance Technologies and Mexico's War on Crime (Oakland, CA: University of California Press, c2016), by Keith Guzik
Filed under: Computer security- Bounty Everything: Hackers and the Making of the Global Bug Marketplace (New York: Data and Society, 2022), by Ryan Ellis and Yuan Stevens (PDF with commentary at datasociety.net)
- The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Cham et al.: Springer Open, c2018), by Olav Lysne (PDF and Epub with commentary at SpringerLink)
- UNIX System Security: A Guide for Users and System Administrators (originally published 1992; free electronic edition 2014), by David A. Curry (multiple formats with commentary at bitsinthewind.com)
- Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press)
- Managing Risk and Information Security: Protect to Enable (c2013), by Malcolm Harkins (multiple formats with commentary at SpringerLink)
- Security Engineering: A Guide to Building Dependable Distributed Systems (second edition, 2008), by Ross Anderson (PDF files with commentary in the UK)
- Computers at Risk: Safe Computing in the Information Age (1991), by National Research Council Computer Science and Telecommunications Board (page images with commentary at NAP)
- A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org)
- The Dark Visitor: Inside the World of Chinese Hackers (c2007), by Scott Henderson (PDF at lulu.com)
- Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com)
- A Guide to Understanding Data Remanence in Automated Information Systems (version 2; 1991), by James K. Goldson (HTML at fas.org)
- The End of Trust (McSweeney's #54; 2018), ed. by McSweeney's (Firm) (PDF at eff.org)
- Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com)
- Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at pearsoncmg.com)
- Securing Java: Getting Down to Business with Mobile Code, by Gary McGraw and Ed Felten (illustrated HTML with commentary at securingjava.com)
- Cracking Codes with Python, by Al Sweigart (illustrated HTML with commentary at inventwithpython.com)
- For the Record: Protecting Electronic Health Information, by National Research Council Computer Science and Telecommunications Board (HTML and page images at NAP)
More items available under broader and related terms at left. |