When I submitted my college textbook, "Trustworthy Computing" in 2005, and newly, the "Cyber-Risk Informatics" in 2014, Wiley editor asked me both times what was so special about my book proposals. Rather, what were they doing that others were not accomplishing, or what void did the book fill? I recall I made my points quite fully, not only explaining but also supporting with statistical findings and website charts to justify the need for a new book-to-be,...