| |||||||||||||
CFC 2010 : Call For Book Chapters | |||||||||||||
Link: http://www.igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=b1a3b29c-53e2-409e-b8c3-a426b8ffbb37 | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
CALL FOR CHAPTER PROPOSALS
Proposal Submission Deadline: July 15, 2010 Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances Editor: Te-Shun Chou East Carolina University, NC, U.S.A. To be published by IGI Global: http://www.igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=b1a3b29c-53e2-409e-b8c3-a426b8ffbb37 Introduction With the rapid growth of Internet based technology, applications of computer networks, such as web search and email service, are extensively used. Nowadays almost no one can exclude himself or herself from using Internet. In the meantime, computer systems inevitably become targets of computer attacks. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system could be accessed and be used by those attackers who are not authorized to access to the information. Hence, this book will be provide a source of knowledge regarding information assurance and security. Objective of the Book This book will detail current trends and advances in information assurance and security, as well as explore emerging applications. The book will be divided into five major categories: attacks and vulnerabilities, security technologies, risk assessment and management, strategic planning of information security, and legal and ethical issues in information security. Together, it provides the readers a broad view of information confidentiality, protection, and management. Target Audience This book provides the readers with an unique opportunity to build a strong, fundamental understanding of theory and methods and thus to find solutions for many of today?s most interesting and challenging problems regarding information assurance and security. With the help of numerous examples, illustrations, as well as tables summarizing the results of quantitative analysis studies, the book will well serve reader?s needs in the field of information assurance and security in various disciplines, e.g. information and communication sciences, administrative sciences and management, education, sociology, computer science, and information technology. Recommended topics include, but are not limited to, the following: * Threats * Attacks * Vulnerabilities * Wireless Security * Intrusion Detection and Prevention * Virtual Private Network * Firewall * Access Control * Authentication * Biometric System * Cryptography * Computer Forensic * Best Practice in Managing Risk * Global Information Security Assessment Methodology * Information Security Risk Assessment Model * Risk Control Measures * Security Policy * Interoperability and Standards * Education and Training * Legal and Ethical Issues in Information Security Submission Procedure Researchers and practitioners are invited to submit on or before June 15, 2010, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by June 30, 2010 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by October 30, 2010. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project. Publisher This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the ?Information Science Reference? (formerly Idea Group Reference), ?Medical Information Science Reference,? ?Business Science Reference,? and ?Engineering Science Reference? imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2011. Important Dates July 15, 2010: Proposal Submission Deadline July 30, 2010: Notification of Acceptance October 30, 2010: Full Chapter Submission January 15, 2010: Review Results Returned February 15, 2011: Revised Chapter Submission February 28, 2011: Final Acceptance Notifications March 15, 2011: Submission of Final Chapters Inquiries and submissions can be forwarded electronically (Word document) or by mail to: Dr. Te-Shun Chou Department of Technology Systems College of Technology and Computer Science 206 Science and Technology Building East Carolina University Greenville, NC 27858, U.S.A. Tel.: 252 737 1037 Fax: 252 328 1618 E-mail: chout@ecu.edu |
|