Theft -- Juvenile literatureSee also what's at your library, or elsewhere.
Broader terms: |
Filed under: Theft -- Juvenile literature
Items below (if any) are from related and broader terms.
Filed under: Theft- An Astrological Judgement Touching Theft (London: Printed by P. Lillicrap, 1665), by Anthony Griffin
Filed under: Theft -- Fiction
Filed under: Burglary -- FictionFiled under: Cattle stealing -- Fiction- The Virginian, by Owen Wister (multiple editions)
- The Rustler: A Tale of Love and War in Wyoming (New York and London: Funk and Wagnalls Co., 1902), by Frances McElrath, illust. by Edwin Willard Deming (page images at HathiTrust)
- The Rustler of Wind River (New York: A. L. Burt Co., 1917), by George W. Ogden, illust. by Frank E. Schoonover (Gutenberg text and illustrated HTML)
- To the Last Man, by Zane Grey (Gutenberg text)
- To the Last Man (Roslyn, NY: W. J. Black, c1922), by Zane Grey (page images at HathiTrust)
- The Cattle-Raid of Cualnge (London: David Nutt, 1904), trans. by L. Winifred Faraday (HTML with commentary at sacred-texts.com)
Filed under: Jewelry theft -- Fiction- Adèle and Co. (c1931), by Dornford Yates (HTML in Canada; NO US ACCESS)
- The Moonstone (novel), by Wilkie Collins
- The Puzzle Lock (New York: Dodd, Mead and Co., 1926), by R. Austin Freeman (page images at HathiTrust)
- The Eustace Diamonds, by Anthony Trollope (Gutenberg text)
- The Eustace Diamonds (2 volumes; New York: Dodd, Mead and Co., 1912), by Anthony Trollope, illust. by George Willis Bardwell (illustrated HTML with commentary at fiftywordsforsnow.com)
- The Mystery of the Blue Train (c1928), by Agatha Christie (Guteberg text)
Filed under: Pet theft -- FictionFiled under: Robbery -- Fiction
Filed under: Bank robberies -- California -- Los Angeles -- FictionFiled under: Pillage -- FictionFiled under: Train robberies -- Fiction- The Great K. & A. Train Robbery (New York: Dodd, Mead and Co., 1897), by Paul Leicester Ford
Filed under: Theft -- Wyoming -- FictionFiled under: Theft -- Juvenile fiction- The Mystery of the Secret Band (The Mary Lou series, #3; Akron and New York: Saalfield Pub. Co. c1935), by Edith Lavell (Gutenberg text and illustrated HTML)
- Missing at Marshlands (Arden Blake Mystery Series #3; New York and Chicago: A. L. Burt Co, c1934), by Cleo F. Garis
- Barry Dare and the Mysterious Box (New York: A. L. Burt Co., c1929), by Gardner Hunting (page images at HathiTrust)
- The Bishop's Shadow, by Ida Treadwell Thurston, illust. by M. Eckerson (Gutenberg text and illustrated HTML)
- The Secret Drawer (London: Sunday School Union; New York: T. Nelson and Sons, 1872), by Isabella Fyvie Mayo (illustrated HTML at Celebration of Women Writers)
- The Tale of Two Bad Mice (London and New York: F. Warne and Co., 1904), by Beatrix Potter
Filed under: Firearms theft -- Juvenile fictionFiled under: Horse stealing -- Juvenile fictionFiled under: Robbery -- Juvenile fiction
Filed under: Bank robberies -- Juvenile fictionFiled under: Robbery investigation -- Juvenile fiction
Filed under: Body snatching -- Scotland- The Court of Cacus: or, The Story of Burke and Hare (London: Houlston and Wright; Edinburgh: W. P. Nimmo, 1861), by Alexander Leighton
- Burke and Hare (Edinburgh and London: W. Hodge and Co., 1921), ed. by William Roughead (multiple formats at archive.org)
- The History of Burke and Hare, and of the Resurrectionist Times: A Fragment from the Criminal Annals of Scotland (Glasgow: T. D. Morison; London: Hamilton, Adams, and Co., 1884), by George Mac Gregor
- Trial of William Burke and Helen M'Dougal, Before the High Court of Justiciary, at Edinburgh, on Wednesday, December 24, 1828, for the Murder of Margery Campbell, or Docherty (Edinburgh: R. Buchanan; et al., 1829), ed. by John Macnee (page images at HathiTrust)
- West Port Murders: or, An Authentic Account of the Atrocious Murders Committed By Burke and His Associates, Containing a Full Account of All The Extraordinary Circumstances Connected With Them (Edinburgh: T. Ireland, 1829)
Filed under: Book thefts -- Comic books, strips, etc.
Filed under: Burglary -- Massachusetts -- History -- 18th centuryFiled under: Burglary protection
Filed under: Locks and keys
Filed under: Locks and keys -- Catalogs- Locks and Hardware (catalog #22; Stamford, CT: Yale and Towne Mfg. Co., c1917), by Yale & Towne Manufacturing Company
Filed under: Locks and keys -- Juvenile fiction
Filed under: Locksmiths -- Fiction- Barnaby Rudge, by Charles Dickens
Filed under: Security systems -- Mexico- Making Things Stick: Surveillance Technologies and Mexico's War on Crime (Oakland, CA: University of California Press, c2016), by Keith Guzik
Filed under: Computer security- Bounty Everything: Hackers and the Making of the Global Bug Marketplace (New York: Data and Society, 2022), by Ryan Ellis and Yuan Stevens (PDF with commentary at datasociety.net)
- The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Cham et al.: Springer Open, c2018), by Olav Lysne (PDF and Epub with commentary at SpringerLink)
- UNIX System Security: A Guide for Users and System Administrators (originally published 1992; free electronic edition 2014), by David A. Curry (multiple formats with commentary at bitsinthewind.com)
- Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press)
- Managing Risk and Information Security: Protect to Enable (c2013), by Malcolm Harkins (multiple formats with commentary at SpringerLink)
- Security Engineering: A Guide to Building Dependable Distributed Systems (second edition, 2008), by Ross Anderson (PDF files with commentary in the UK)
- Computers at Risk: Safe Computing in the Information Age (1991), by National Research Council Computer Science and Telecommunications Board (page images with commentary at NAP)
- A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org)
- The Dark Visitor: Inside the World of Chinese Hackers (c2007), by Scott Henderson (PDF at lulu.com)
- Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com)
- A Guide to Understanding Data Remanence in Automated Information Systems (version 2; 1991), by James K. Goldson (HTML at fas.org)
- The End of Trust (McSweeney's #54; 2018), ed. by McSweeney's (Firm) (PDF at eff.org)
- Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com)
- Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at pearsoncmg.com)
- Securing Java: Getting Down to Business with Mobile Code, by Gary McGraw and Ed Felten (illustrated HTML with commentary at securingjava.com)
- Cracking Codes with Python, by Al Sweigart (illustrated HTML with commentary at inventwithpython.com)
- For the Record: Protecting Electronic Health Information, by National Research Council Computer Science and Telecommunications Board (HTML and page images at NAP)
More items available under broader and related terms at left. |