I heard a very good computer security maxim from one of my professors:
"If someone else has physical access to your computer, it is not your computer."
Most security measures an OS can provide are "alive" only when the OS is actually running. If you are able to run another OS on the same computer (not just through dual boot, booting a USB stick or DVD are very common attacks), the file systems of the non-running OS are just data, free to be read or modified at will.
The only way you can defend from this is by using a hard drive encryption system. This still allows an attacker to destroy your installation, but will likely thwart most attempts to steal data. (That said, there is no such thing as a perfect protection.)