Do you have a question? Post it now! No Registration Necessary. Now with pictures!
- Francine HERRMANN
August 29, 2005, 11:00 pm
rate this thread
Advances in Enterprise Information Technology Security
Information about customers, competitors, products and processes is a key
issue for an enterprise's success. Providing and maintaining consistent
security of this information on servers and across networks must be one of
the enterprise's business activities. The book will provide a broad working
knowledge of all the major security issues affecting today's enterprise IT
activities, giving readers the tools to address opportunities in the field.
This is mainly because the security factors provide the enterprise a high
potential in order to provide trusted services to their customers. This
book will show readers how to apply a number of security techniques to the
enterprise environment with its complex and various applications. It covers
the entire field of enterprise security, including: database security and
integrity, security policies, computer and client/server systems,
communication networks and multimedia, applications and operating system
software, security of collaborative applications, enterprise security
identity management, and enterprise security risk management. It will be an
all-in-one reference for IT managers, researchers, application integrators,
database and network administrators, graduate and postgraduate students,
and software architects.
BOOK TABLE OF CONTENTS
Part 1: Communications and Multimedia
- Web services security,
- Information hiding,
- Security architectures,
- Firewalls and network security,
- Mobile security,
- e-commerce systems.
Part 2: Trust and Privacy
- Database security and integrity,
- Security policies,
- Security of collaborative applications (such as workflow systems),
- Policy right management.
Part 3: Authorization
- Enterprise security identity management,
- Key management,
- Role based access control,
- Secure transactions,
- Global key infrastructures.
Part 4: Risk Management
- Malicious code,
- Preventive security,
- Digital right management,
- Enterprise security risk management,
- System and software life cycles security integration.
OVERALL OBJECTIVES AND MISSION OF THE BOOK
The focus is on IT security for the enterprise. It aims to be used as a
desk reference because it will be a best collection of papers written by
many authors instead of a book that focuses on a specific approach or
methodology. The main motivation on this is that we are convinced that
there are no simple and complete answers to the issues of security. We
actually cannot think that the only security action to perform in order to
secure the enterprise information systems is to install a firewall, improve
their authentication method, or write a security policy. This should not be
considered as a complete solution, though it will help in improving its
The book chapters comprising this desk reference will be organized in
logical groupings that are akin to appropriate levels in enterprise IT
security. Each section of the actual book will be devoted to carefully
chosen papers, some of which will reflect individual authors' experiences.
The strength of this approach is that it gives a benefit from a rich
diversity of viewpoints and deep subject matter knowledge.
THE AUDIENCE OF THE BOOK
IT Managers, application integrators, database and network administrators,
graduate and postgraduate students, software architects, researchers.
Researchers and practitioners are invited to submit on or before October
15, 2005, a 2-3 page manuscript proposal clearly explaining the mission and
concerns of the proposed chapter. Authors of accepted proposal will be
notified by October 31, 2005 about the status of their proposal and sent
chapter organizationally guidelines. Full chapters must be submitted by
January 31, 2006 via email to the editors. All submitted chapters will be
double-blind reviewed and authors will be notified about needed revisions
by March 31, 2006. The revised chapters are due by April 30, 2006. Authors
will be informed about the final acceptance status by May 31, 2006. The
final chapters, disks, and author biographies are due on June 30, 2006.
The authors should provide the manuscript in electronic format in MS Word
or RTF format and should be sent as an attachment via email to the
Dr. Eng. Djamel KHADRAOUI (Centre Henri Tudor - Luxembourg) and Dr.
Francine HERRMANN (University of Metz - France)
The book is scheduled to be published by Idea Group Inc.,
http://www.idea-group.com , publisher of the Idea Group Publishing,
Information Science Publishing, IRM Press, CyberTech Publishing and Idea
Group Reference imprints, in 2006.
- » What's in your "Recovery" Toolbox? (HDD, Registry, Backup/Sync, etc.)
- — Previous thread in » General Computer Security