posted by user: chout || 7687 views || tracked by 9 users: [display]

CFC 2010 : Call For Book Chapters

FacebookTwitterLinkedInGoogle

Link: http://www.igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=b1a3b29c-53e2-409e-b8c3-a426b8ffbb37
 
When Jun 20, 2010 - Jul 30, 2010
Where U.S.A.
Submission Deadline Jul 15, 2010
Notification Due Jul 30, 2010
Categories    security   networking   information security   network security
 

Call For Papers

CALL FOR CHAPTER PROPOSALS

Proposal Submission Deadline: July 15, 2010
Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances
Editor: Te-Shun Chou
East Carolina University, NC, U.S.A.

To be published by IGI Global: http://www.igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=b1a3b29c-53e2-409e-b8c3-a426b8ffbb37

Introduction
With the rapid growth of Internet based technology, applications of computer networks, such as web search and email service, are extensively used. Nowadays almost no one can exclude himself or herself from using Internet. In the meantime, computer systems inevitably become targets of computer attacks. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system could be accessed and be used by those attackers who are not authorized to access to the information. Hence, this book will be provide a source of knowledge regarding information assurance and security.

Objective of the Book
This book will detail current trends and advances in information assurance and security, as well as explore emerging applications. The book will be divided into five major categories: attacks and vulnerabilities, security technologies, risk assessment and management, strategic planning of information security, and legal and ethical issues in information security. Together, it provides the readers a broad view of information confidentiality, protection, and management.

Target Audience
This book provides the readers with an unique opportunity to build a strong, fundamental understanding of theory and methods and thus to find solutions for many of today?s most interesting and challenging problems regarding information assurance and security. With the help of numerous examples, illustrations, as well as tables summarizing the results of quantitative analysis studies, the book will well serve reader?s needs in the field of information assurance and security in various disciplines, e.g. information and communication sciences, administrative sciences and management, education, sociology, computer science, and information technology.

Recommended topics include, but are not limited to, the following:
* Threats
* Attacks
* Vulnerabilities
* Wireless Security
* Intrusion Detection and Prevention
* Virtual Private Network
* Firewall
* Access Control
* Authentication
* Biometric System
* Cryptography
* Computer Forensic
* Best Practice in Managing Risk
* Global Information Security Assessment Methodology
* Information Security Risk Assessment Model
* Risk Control Measures
* Security Policy
* Interoperability and Standards
* Education and Training
* Legal and Ethical Issues in Information Security

Submission Procedure
Researchers and practitioners are invited to submit on or before June 15, 2010, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by June 30, 2010 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by October 30, 2010. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the ?Information Science Reference? (formerly Idea Group Reference), ?Medical Information Science Reference,? ?Business Science Reference,? and ?Engineering Science Reference? imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2011.

Important Dates
July 15, 2010: Proposal Submission Deadline
July 30, 2010: Notification of Acceptance
October 30, 2010: Full Chapter Submission
January 15, 2010: Review Results Returned
February 15, 2011: Revised Chapter Submission
February 28, 2011: Final Acceptance Notifications
March 15, 2011: Submission of Final Chapters

Inquiries and submissions can be forwarded electronically (Word document) or by mail to:
Dr. Te-Shun Chou
Department of Technology Systems
College of Technology and Computer Science
206 Science and Technology Building
East Carolina University
Greenville, NC 27858, U.S.A.
Tel.: 252 737 1037
Fax: 252 328 1618
E-mail: chout@ecu.edu

Related Resources

Book 2025   Call for book Chapters Mitigating the Risks of AI Deepfakes
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SpS&DA 2025   Call for book chapters - Speech strategies and discourse analysis: the powerful and the oppressed (edited volume)
NTIJ 2024   Nanoscience and Technology: An International Journal
DLGM 2024   Call For Book Chapters 2024: Deep Learning in Genome Mapping, CRC Press (Taylor & Francis Group)
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
The Mississippi River: A Cultural Artery 2025   Call for Papers: The Mississippi: Soundings on America’s Arterial River
SECRYPT 2025   22nd International Conference on Security and Cryptography
CFC-6G-CyberSecurity 2025   CFC - Book: 6G Networks and AI-Driven Cybersecurity
Call for Book Chapters 2024   Call for Book Chapters on Creative Disruption: Impact of AI on English Language and Literature Studies