Ass1_Example - modern times. Detailed examples of how code...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Ethical Hacking as a Course in Tertiary Education by Rob Bainbridge 1. Introduction This paper is an annotated bibliography of resources based on the subject of whether ‘Ethical Hacking’ should be taught as a course in tertiary education. The resources identified cover areas such as the social, legal, and ethical implication of this issue… .The relevance of this topic is becoming more… .A concluding statement is also provided detailing how the references identified will contribute as informative sources for a report based on this topic. 2. Annotated Bibliography Pfleeger, C.P. 1999, Security in Computing , 2 nd edn, Prentic-Hall Inc, NY. The author describes issues of computer security across a network. Examples of generalised framework are depicted throughout the book. Very specific cases are cited by the author. Some of these cases introduce steps for resolution…. (Around 100 words per annotation). Singh, S. 1999, The Code Book , Fourth Estate, UK. The author traces the history of cryptography from early English medieval to
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: modern times. Detailed examples of how code are devised and broken. In addition, reference to teams of code-breakers who cracked the Enigma code and also their obligation to the public in understanding their responsibilities Tibby, A. 2002, A Good Journal Article , Publisher Inc, Bundaberg. Around 100 words 3. Conclusion The resources identified provide a foundation for understanding the key terms in the topic. .They also provide a balanced approach to the topic by proving resources that support arguments for and against .The social implications of this issue have been covered The article by Tibby (2002) provides information on the legal. 4. Bibliography Pfleeger, C.P. 1999, Security in Computing , 2 nd edn, Prentic-Hall Inc, NY. Singh, S. 1999, The Code Book , Fourth Estate, UK. Tibby, A. 2002, A Good Journal Article , Publisher Inc, Bundaberg....
View Full Document

This note was uploaded on 12/25/2011 for the course ECE 101 taught by Professor Sd during the Spring '11 term at Birla Institute of Technology & Science, Pilani - Hyderabad.

Ask a homework question - tutors are online