2010-02-22

[Tccc] Call for Book chapters on Security: Proposal March 15 full chapter May 31

* *

*CALL FOR CHAPTER PROPOSALS*

*Proposal Submission Deadline: March 15, 2010*

*Full Chapter Deadline: May 31, 2010*

*Cyber Security Standards, Practices and Industrial Applications:*

*Systems and Methodologies*

A book edited by Dr. Junaid Zubairi and Dr. Athar Mahboob

State University of New York at Fredonia, NY, USA

and National University of Sciences & Technology, Karachi, Pakistan

To be published by IGI Global:
http://www.igi-global.com/requests/details.asp?ID=767<https://webmail.fredonia.edu/exchweb/bin/redir.asp?URL=http://www.igi-global.com/requests/details.asp?ID=767>

*Introduction*

The topic of cyber security has assumed the utmost importance in today's
information age. Cyber security covers both information and network
security. Information security covers security requirements, classification
of threats, attacks and protection systems, and methodologies. Encryption is
an enabling technology for data and information security. Network security
includes both security protocols as well as systems which create a security
perimeter around networks. Network security protocols combine encryption and
several related mechanisms, like hashing and digital signatures, along with
procedures for key and session management which allow for parties to
establish secure communication links over otherwise insecure communication
networks and exchange private information such as personal and financial
data.

As part of proactive information security, Security Information Management
(SIM) systems are set up by those tasked with managing information security
in their respective organizations. These systems consolidate and analyze the
information system usage logs in real-time for alerting and in off-line mode
for demonstrating system security and compliance to standards. At this time
real-time audio, video and instant messaging systems are used ubiquitously
over integrated and converged public communication networks. Their security
requirements include protection against eavesdropping and end to end
authentication.

Cyber security of industrial manufacturing and utility industries, such as
power, water and gas, has assumed national defense status. Most industries,
including power generation and manufacturing, use PLC's (programmable logic
controllers) that are connected to computers for remote control. SCADA and
industrial systems security includes protection of SCADA control units or
industrial equipment in production, power generation & distribution,
fabrication, refining, public and private infrastructure institutions, and
large communication systems. The area of industrial and infrastructure
security is very important and various governments have mandated the
compliance by all institutions and services to many security regulations.

* *

*Objective of the Book*

This book aims to provide a comprehensive reference in cyber security
covering all important topics including encryption, authentication,
integrity, security infrastructure and protocols. It will be divided into
sections that pertain to digital information encryption techniques, secure
networking protocols, security management systems and industrial and SCADA
security standards. In each section, reviews of the current technology and
introduction of new techniques would be covered. Thus it would not only
serve as a reference for existing technologies, it would also become a
reference for innovation in this field.

*Target Audience*

This book would serve a broad audience including researchers and
practitioners in cyber and industrial security, e-commerce and web security
experts, academicians, students and working professionals in utilities,
manufacturing, municipal services, government, defense and networking
companies.**

* *

*Recommended Topics for Chapter Proposals*

Recommended topics include, but are not limited to, the following:

· Cyber Security Threats

· Network Security Protocols

· Contemporary Encryption Standards

· Network Perimeter Security

· Intrusion Detection Systems

· Malicious Software and Protection Technologies

· The Case for Biometrics in Cyber Security

· Security Features in Modern Operating Systems

· Electronic Mail Security Standards

· Security Technologies for Real-time Audio, Video and IM
Communication

· Public Key Infrastructure: How to deploy PKI successfully

· Open Source Tools for Cyber Security Practitioner

· Information Security Audits: How to do them successfully

· Security Information Management

· Business Continuity Planning

· Cyber Security in SCADA based Industrial Plants

· Cyber Security in the Electric Power Generation and Distribution
Industry

· Cyber Security of Water Supply Systems


Submission Procedure

Researchers, practitioners and professionals are invited to submit *on or
before March 15 2010*, a *chapter proposal*, maximum three pages long,
clearly explaining the topic and objectives of their proposed chapter. The
proposal should be in Word or PDF format and should be sent to
igibook2010@gmail.com. Authors of accepted proposals will be notified
by *April
1, 2010* about the status of their proposals and sent chapter guidelines if
the proposal is accepted. Full chapters are to be submitted by *May 31, 2010
*. All submitted chapters will be reviewed on a double-blind review basis.
Contributors may also be requested to serve as reviewers for this project.

*Publisher*

This book is scheduled to be published by IGI Global, publisher of the
"Information Science Reference" (formerly Idea Group Reference), "Medical
Information Science Reference," "Business Science Reference," and
"Engineering Science Reference" imprints. For additional information
regarding the publisher, please visit www.igi-global.com. This publication
is anticipated to be released in 2011.

*Editorial Advisory Board*

Dr. Kassam Saleh

Professor, Computer Sciences, University of Kuwait,

Certified Information Security Professional

saleh.kassem@yahoo.com

Dr. Badar Hussain, P.E.

Director of Engineering

KCI Engineering, 1401 Branding Lane, Suite 255

Downers Grove, IL 60515

bhussain@kciconsultants.com

Dr. Sajjad A. Madani

Department of Computer Science, COMSATS Institute of Information Technology,
Abbottabad, Pakistan

madani@ciit.net.pk

Dr. Omer Mahmoud

Department of Electrical and Computer Engineering

IIUM, Kuala Lumpur, Malaysia

omer_one@yahoo.com

* *

*Important Dates*

*March 15, 2010: *Chapter* *proposal submission deadline

*April 1, 2010: *Proposal acceptance notification and
invitation to submit full chapter

*May 31, 2010: *Full chapter submission deadline

*July 31, 2010: *Review results including notification
of acceptance of chapter

*August 31, 2010: *Final Chapter Submission

*November 30, 2010: *Final Deadline
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

No comments: