posted by user: chout || 6126 views || tracked by 9 users: [display]

CFC 2010 : Call For Book Chapters

FacebookTwitterLinkedInGoogle

Link: http://www.igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=b1a3b29c-53e2-409e-b8c3-a426b8ffbb37
 
When Jun 20, 2010 - Jul 30, 2010
Where U.S.A.
Submission Deadline Jul 15, 2010
Notification Due Jul 30, 2010
Categories    security   networking   information security   network security
 

Call For Papers

CALL FOR CHAPTER PROPOSALS

Proposal Submission Deadline: July 15, 2010
Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances
Editor: Te-Shun Chou
East Carolina University, NC, U.S.A.

To be published by IGI Global: http://www.igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=b1a3b29c-53e2-409e-b8c3-a426b8ffbb37

Introduction
With the rapid growth of Internet based technology, applications of computer networks, such as web search and email service, are extensively used. Nowadays almost no one can exclude himself or herself from using Internet. In the meantime, computer systems inevitably become targets of computer attacks. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system could be accessed and be used by those attackers who are not authorized to access to the information. Hence, this book will be provide a source of knowledge regarding information assurance and security.

Objective of the Book
This book will detail current trends and advances in information assurance and security, as well as explore emerging applications. The book will be divided into five major categories: attacks and vulnerabilities, security technologies, risk assessment and management, strategic planning of information security, and legal and ethical issues in information security. Together, it provides the readers a broad view of information confidentiality, protection, and management.

Target Audience
This book provides the readers with an unique opportunity to build a strong, fundamental understanding of theory and methods and thus to find solutions for many of today?s most interesting and challenging problems regarding information assurance and security. With the help of numerous examples, illustrations, as well as tables summarizing the results of quantitative analysis studies, the book will well serve reader?s needs in the field of information assurance and security in various disciplines, e.g. information and communication sciences, administrative sciences and management, education, sociology, computer science, and information technology.

Recommended topics include, but are not limited to, the following:
* Threats
* Attacks
* Vulnerabilities
* Wireless Security
* Intrusion Detection and Prevention
* Virtual Private Network
* Firewall
* Access Control
* Authentication
* Biometric System
* Cryptography
* Computer Forensic
* Best Practice in Managing Risk
* Global Information Security Assessment Methodology
* Information Security Risk Assessment Model
* Risk Control Measures
* Security Policy
* Interoperability and Standards
* Education and Training
* Legal and Ethical Issues in Information Security

Submission Procedure
Researchers and practitioners are invited to submit on or before June 15, 2010, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by June 30, 2010 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by October 30, 2010. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the ?Information Science Reference? (formerly Idea Group Reference), ?Medical Information Science Reference,? ?Business Science Reference,? and ?Engineering Science Reference? imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2011.

Important Dates
July 15, 2010: Proposal Submission Deadline
July 30, 2010: Notification of Acceptance
October 30, 2010: Full Chapter Submission
January 15, 2010: Review Results Returned
February 15, 2011: Revised Chapter Submission
February 28, 2011: Final Acceptance Notifications
March 15, 2011: Submission of Final Chapters

Inquiries and submissions can be forwarded electronically (Word document) or by mail to:
Dr. Te-Shun Chou
Department of Technology Systems
College of Technology and Computer Science
206 Science and Technology Building
East Carolina University
Greenville, NC 27858, U.S.A.
Tel.: 252 737 1037
Fax: 252 328 1618
E-mail: chout@ecu.edu

Related Resources

IoT-DataScience 2020   Call for Book Chapters on Emerging Trends in IoT and Integration with Data Science, IGI Global 2020
AVC 2020   Advances in Vision Computing: An International Journal
CPCS 2020   Call for Chapters: Security and Privacy in Cyber-Physical Systems: Threats and Defenses
IJCCSA 2020   International Journal on Cloud Computing: Services and Architecture
Smart-Cities 2020   Call for Springer Book Chapters : Smart City Architecture and Infrastructure: An IoT Perspective
IJCIS 2020   International Journal on Cryptography and Information Security
Call for Contributions 2021   Beyond the 2ÂșC: Business and Policy Trajectories to Climate Change Adaptation
ICISPP--IEEE, Ei, Scopus 2020   IEEE--2020 International Conference on Information Security and Privacy Protection (ICISPP 2020)--Ei Compendex, Scopus
MIBDATACYBER 2020   CFC SPRINGER BOOK: MACHINE INTELLIGENCE AND BIG DATA ANALYTICS FOR CYBERSECURITY APPLICATIONS
CLSB 2020   International Conference on Cloud Computing, Security and Blockchain