2010-06-02

[Tccc] Call For Book Chapters: Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances

Apologies if you receive multiple copies of this CFC.
Please forward to colleagues who might be interested.

CALL FOR CHAPTER PROPOSALS
Proposal Submission Deadline: June 15, 2010
Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances
Editor: Te-Shun Chou
East Carolina University, NC, U.S.A.

To be published by IGI Global: http://www.igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=b1a3b29c-53e2-409e-b8c3-a426b8ffbb37

Introduction
With the rapid growth of Internet based technology, applications of computer networks, such as web search and email service, are extensively used. Nowadays almost no one can exclude himself or herself from using Internet. In the meantime, computer systems inevitably become targets of computer attacks. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system could be accessed and be used by those attackers who are not authorized to access to the information. Hence, this book will be provide a source of knowledge regarding information assurance and security.

Objective of the Book
This book will detail current trends and advances in information assurance and security, as well as explore emerging applications. The book will be divided into five major categories: attacks and vulnerabilities, security technologies, risk assessment and management, strategic planning of information security, and legal and ethical issues in information security. Together, it provides the readers a broad view of information confidentiality, protection, and management.

Target Audience
This book provides the readers with an unique opportunity to build a strong, fundamental understanding of theory and methods and thus to find solutions for many of today?s most interesting and challenging problems regarding information assurance and security. With the help of numerous examples, illustrations, as well as tables summarizing the results of quantitative analysis studies, the book will well serve reader?s needs in the field of information assurance and security in various disciplines, e.g. information and communication sciences, administrative sciences and management, education, sociology, computer science, and information technology.

Recommended topics include, but are not limited to, the following:
* Threats
* Attacks
* Vulnerabilities
* Wireless Security
* Intrusion Detection and Prevention
* Virtual Private Network
* Firewall
* Access Control
* Authentication
* Biometric System
* Cryptography
* Computer Forensic
* Best Practice in Managing Risk
* Global Information Security Assessment Methodology
* Information Security Risk Assessment Model
* Risk Control Measures
* Security Policy
* Interoperability and Standards
* Education and Training
* Legal and Ethical Issues in Information Security

Submission Procedure
Researchers and practitioners are invited to submit on or before June 15, 2010, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by June 30, 2010 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by October 30, 2010. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the ?Information Science Reference? (formerly Idea Group Reference), ?Medical Information Science Reference,? ?Business Science Reference,? and ?Engineering Science Reference? imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2011.

Important Dates
June 15, 2010: Proposal Submission Deadline
June 30, 2010: Notification of Acceptance
October 30, 2010: Full Chapter Submission
January 15, 2010: Review Results Returned
February 15, 2011: Revised Chapter Submission
February 28, 2011: Final Acceptance Notifications
March 15, 2011: Submission of Final Chapters

Inquiries and submissions can be forwarded electronically (Word document) or by mail to:
Dr. Te-Shun Chou
Department of Technology Systems
College of Technology and Computer Science
206 Science and Technology Building
East Carolina University
Greenville, NC 27858, U.S.A.
Tel.: 252 737 1037
Fax: 252 328 1618
E-mail: chout@ecu.edu

_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

No comments: