Unformatted text preview: modern times. Detailed examples of how code are devised and broken. In addition, reference to teams of code-breakers who cracked the Enigma code and also their obligation to the public in understanding their responsibilities… Tibby, A. 2002, A Good Journal Article , Publisher Inc, Bundaberg. Around 100 words… 3. Conclusion The resources identified provide a foundation for understanding the key terms in the topic…. .They also provide a balanced approach to the topic by proving resources that support arguments for and against… .The social implications of this issue have been covered… The article by Tibby (2002) provides information on the legal…. 4. Bibliography Pfleeger, C.P. 1999, Security in Computing , 2 nd edn, Prentic-Hall Inc, NY. Singh, S. 1999, The Code Book , Fourth Estate, UK. Tibby, A. 2002, A Good Journal Article , Publisher Inc, Bundaberg....
View Full Document
- Spring '11
- Cryptography, Enigma machine, Good Journal Article