Cryptologic fiction
Resource Information
The concept Cryptologic fiction represents the subject, aboutness, idea or notion of resources found in Evanston Public Library.
The Resource
Cryptologic fiction
Resource Information
The concept Cryptologic fiction represents the subject, aboutness, idea or notion of resources found in Evanston Public Library.
- Label
- Cryptologic fiction
- Source
- lcgft
137 Items that share the Concept Cryptologic fiction
Context
Context of Cryptologic fictionSubject of
No resources found
No enriched resources found
- 39 clues, Cahills vs. Vespers, vol. 5 :Trust no one
- A king's ransom
- A king's ransom
- All the devils are here
- All the devils are here
- Beyond the grave
- Beyond the grave
- Beyond the grave
- Call of the wraith
- Charlie Thorne and the last equation
- Charlie Thorne and the lost city
- Code of honor
- Code of silence
- Code talker : a novel about the Navajo Marines of World War Two
- Cryptonomicon
- Day of doom
- Day of doom
- Dead time
- Devils in daylight
- Doom at Grant's tomb
- Duke with benefits
- End of story
- Escape from Mr. Lemoncello's library
- Flashpoint
- Flashpoint
- Flashpoint
- How I became a spy : a mystery of WWII London
- In too deep
- Into the gauntlet
- Into the gauntlet
- Killing Rachel
- King & Kayla and the case of the secret code
- King & Kayla and the case of the secret code
- King and Kayla and the case of the secret code
- Lineage most lethal
- Mac cracks the code
- Mac saves the world
- Malcolm under the stars
- Mark of the plague
- Mask
- Mission Titanic
- Mission Titanic
- Mission hurricane
- Mr. Lemoncello and the titanium ticket
- Mr. Lemoncello and the titanium ticket
- Mr. Lemoncello's Library Olympics
- Mr. Lemoncello's all-star breakout game
- Mr. Lemoncello's great library race
- Mystery on the Starship Crusader
- Nowhere to run
- Nowhere to run
- Nowhere to run
- Nowhere to run
- One false note
- One false note
- Operation Trinity
- Operation Trinity
- Operation Trinity
- Origin : a novel
- PhDeath : the Puzzler murders
- Ruby Redfort look into my eyes
- Ruby Redfort take your last breath
- Sabotage
- Salem's cipher
- Samantha Spinner and the boy in the ball
- Samantha Spinner and the perplexing pants
- Samantha Spinner and the spectacular specs
- Samantha Spinner and the super-secret plans
- Seven novels : complete and unabridged
- Shatterproof
- Silver ravens
- Sly the sleuth and the code mysteries
- Solving Zoe
- Spymasters
- Storm warning
- Strong like the sea
- The Blackthorn key
- The Dante chamber
- The Enigma game
- The Hawthorne legacy
- The Jefferson key : a novel
- The Medusa plot
- The Medusa plot
- The Medusa plot
- The Romeo and Juliet code
- The amber shadows
- The assassin's curse
- The black book of buried secrets
- The black circle
- The book of lost names
- The bridge to Never Land
- The case of the double cross
- The cipher
- The clockwork ghost
- The clue in the crossword cipher
- The crown heist
- The devil colony
- The devil colony : a Sigma Force novel
- The devil colony : a Sigma Force novel
- The doomsday key
- The doomsday key : a [upper case Greek letter "sigma"] Sigma Force novel
- The emperor's code
- The emperor's code
- The explorer's code
- The eye of God : a Sigma Force novel
- The falcon's feather
- The final treasure
- The finisher
- The finisher
- The fire : a novel
- The great Shelby Holmes and the coldest case
- The longest night of Charlie Noon
- The lost cipher
- The maze of bones
- The maze of bones
- The mysterious code
- The narwhal problem
- The nebula secret
- The rose code : a novel
- The secret cipher
- The secret of Phantom Island
- The secret of Red Gate Farm
- The secret three.
- The shadow cipher
- The spotted dog last seen
- The star dunes
- The sword thief
- The sword thief
- The tiger's nest/
- The unbreakable code
- The viper's nest
- The viper's nest
- Traitor angels
- Trust no one
- Trust no one
- Unearthed
- Vespers rising
- William Wenton and the impossible puzzle
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.epl.org/resource/LggFi7hAbpM/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.epl.org/resource/LggFi7hAbpM/">Cryptologic fiction</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.epl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.epl.org/">Evanston Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Cryptologic fiction
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.epl.org/resource/LggFi7hAbpM/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.epl.org/resource/LggFi7hAbpM/">Cryptologic fiction</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.epl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.epl.org/">Evanston Public Library</a></span></span></span></span></div>