This preview shows page 1. Sign up to view the full content.
Unformatted text preview: modern times. Detailed examples of how code are devised and broken. In addition, reference to teams of code-breakers who cracked the Enigma code and also their obligation to the public in understanding their responsibilities Tibby, A. 2002, A Good Journal Article , Publisher Inc, Bundaberg. Around 100 words 3. Conclusion The resources identified provide a foundation for understanding the key terms in the topic. .They also provide a balanced approach to the topic by proving resources that support arguments for and against .The social implications of this issue have been covered The article by Tibby (2002) provides information on the legal. 4. Bibliography Pfleeger, C.P. 1999, Security in Computing , 2 nd edn, Prentic-Hall Inc, NY. Singh, S. 1999, The Code Book , Fourth Estate, UK. Tibby, A. 2002, A Good Journal Article , Publisher Inc, Bundaberg....
View Full Document
This note was uploaded on 12/25/2011 for the course ECE 101 taught by Professor Sd during the Spring '11 term at Birla Institute of Technology & Science, Pilani - Hyderabad.
- Spring '11