Skip to main content

Seven Deadliest Network Attacks

Download Seven Deadliest Network Attacks Full eBooks in PDF, EPUB, and kindle. Seven Deadliest Network Attacks is one my favorite book and give us some inspiration, very enjoy to read. you could read this book anywhere anytime directly from your device.

Seven Deadliest Network Attacks

Seven Deadliest Network Attacks Book
Author : Stacy Prowell,Rob Kraus,Mike Borkin
Publisher : Elsevier
Release : 2010-06-02
ISBN : 1597495506
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The book consists of seven chapters that deal with the following attacks: denial of service; war dialing; penetration testing; protocol tunneling; spanning tree attacks; man-in-the-middle; and password replay. These attacks are not mutually exclusive and were chosen because they help illustrate different aspects of network security. The principles on which they rely are unlikely to vanish any time soon, and they allow for the possibility of gaining something of interest to the attacker, from money to high-value data. This book is intended to provide practical, usable information. However, the world of network security is evolving very rapidly, and the attack that works today may (hopefully) not work tomorrow. It is more important, then, to understand the principles on which the attacks and exploits are based in order to properly plan either a network attack or a network defense. Seven Deadliest Network Attacks will appeal to information security professionals of all levels, network admins, and recreational hackers. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable

Seven Deadliest Social Network Attacks

Seven Deadliest Social Network Attacks Book
Author : Carl Timm,Richard Perez
Publisher : Syngress
Release : 2010-06-02
ISBN : 9781597495462
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, and provides a comprehensive view into how such attacks have impacted the livelihood and lives of adults and children. It lays out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The book is separated into seven chapters, with each focusing on a specific type of attack that has been furthered with social networking tools and devices. These are: social networking infrastructure attacks; malware attacks; phishing attacks; Evil Twin Attacks; identity theft; cyberbullying; and physical threat. Each chapter takes readers through a detailed overview of a particular attack to demonstrate how it was used, what was accomplished as a result, and the ensuing consequences. In addition to analyzing the anatomy of the attacks, the book offers insights into how to develop mitigation strategies, including forecasts of where these types of attacks are heading. This book can serve as a reference guide to anyone who is or will be involved in oversight roles within the information security field. It will also benefit those involved or interested in providing defense mechanisms surrounding social media as well as information security professionals at all levels, those in the teaching profession, and recreational hackers. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable

Seven Deadliest Unified Communications Attacks

Seven Deadliest Unified Communications Attacks Book
Author : Dan York
Publisher : Syngress
Release : 2010-06-04
ISBN : 1597495484
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The book describes the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. There are seven chapters that focus on the following: attacks against the UC ecosystem and UC endpoints; eavesdropping and modification attacks; control channel attacks; attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection; attacks on identity; and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability. This book will be of interest to information security professionals of all levels as well as recreational hackers. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable

Seven Deadliest Wireless Technologies Attacks

Seven Deadliest Wireless Technologies Attacks Book
Author : Brad Haines
Publisher : Syngress
Release : 2010-03-13
ISBN : 9781597495424
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised. This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers. Attacks detailed in this book include: 802.11 Wireless—Infrastructure Attacks 802.11 Wireless—Client Attacks Bluetooth Attacks RFID Attacks Analog Wireless Device Attacks Bad Encryption Attacks on Cell Phones, PDAs and Other Hybrid Devices

Seven Deadliest Microsoft Attacks

Seven Deadliest Microsoft Attacks Book
Author : Rob Kraus,Brian Barber,Mike Borkin,Naomi Alpern
Publisher : Elsevier
Release : 2010-03-01
ISBN : 1597495522
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Seven Deadliest Microsoft Attacks explores some of the deadliest attacks made against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of the most closely guarded company secrets. If you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products, this book is for you. It pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The book consists of seven chapters that cover the seven deadliest attacks against Microsoft software and networks: attacks against Windows passwords; escalation attacks; stored procedure attacks; mail service attacks; client-side ActiveX and macro attacks; Web service attacks; and multi-tier attacks. Each chapter provides an overview of a single Microsoft software product, how it is used, and some of the core functionality behind the software. Furthermore, each chapter explores the anatomy of attacks against the software, the dangers of an attack, and possible defenses to help prevent the attacks described in the scenarios. This book will be a valuable resource for those responsible for oversight of network security for either small or large organizations. It will also benefit those interested in learning the details behind attacks against Microsoft infrastructure, products, and services; and how to defend against them. Network administrators and integrators will find value in learning how attacks can be executed, and transfer knowledge gained from this book into improving existing deployment and integration practices. Windows Operating System-Password Attacks Active Directory-Escalation of Privilege SQL Server-Stored Procedure Attacks Exchange Server-Mail Service Attacks Office-Macros and ActiveX Internet Information Serives(IIS)-Web Serive Attacks SharePoint-Multi-tier Attacks

Seven Deadliest Web Application Attacks

Seven Deadliest Web Application Attacks Book
Author : Mike Shema
Publisher : Syngress
Release : 2010-02-20
ISBN : 9781597495448
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the seven deadliest vulnerabilities exploited by attackers. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Each chapter presents examples of different attacks conducted against web sites. The methodology behind the attack is explored, showing its potential impact. The chapter then moves on to address possible countermeasures for different aspects of the attack. The book consists of seven chapters that cover the following: the most pervasive and easily exploited vulnerabilities in web sites and web browsers; Structured Query Language (SQL) injection attacks; mistakes of server administrators that expose the web site to attack; brute force attacks; and logic attacks. The ways in which malicious software malware has been growing as a threat on the Web are also considered. This book is intended for information security professionals of all levels, as well as web application developers and recreational hackers. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable

Seven Deadliest USB Attacks

Seven Deadliest USB Attacks Book
Author : Brian Anderson,Barbara Anderson
Publisher : Syngress
Release : 2010-06-03
ISBN : 9781597495547
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Seven Deadliest USB Attacks provides a comprehensive view of the most serious types of Universal Serial Bus (USB) attacks. While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally susceptible to similar attacks. If you need to keep up with the latest hacks, attacks, and exploits effecting USB technology, then this book is for you. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The attacks outlined in this book are intended for individuals with moderate Microsoft Windows proficiency. The book provides the tools, tricks, and detailed instructions necessary to reconstruct and mitigate these activities while peering into the risks and future aspects surrounding the respective technologies. There are seven chapters that cover the following: USB Hacksaw; the USB Switchblade; viruses and malicious codes; USB-based heap overflow; the evolution of forensics in computer security; pod slurping; and the human element of security, including the risks, rewards, and controversy surrounding social-engineering engagements. This book was written to target a vast audience including students, technical staff, business leaders, or anyone seeking to understand fully the removable-media risk for Windows systems. It will be a valuable resource for information security professionals of all levels, as well as web application developers and recreational hackers. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable

The Basics of Hacking and Penetration Testing

The Basics of Hacking and Penetration Testing Book
Author : Patrick Engebretson
Publisher : Elsevier
Release : 2011-07-21
ISBN : 9781597496568
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy – no prior hacking experience is required. It shows how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. With a simple and clean explanation of how to effectively utilize these tools – as well as the introduction to a four-step methodology for conducting a penetration test or hack – the book provides students with the know-how required to jump start their careers and gain a better understanding of offensive security. The book is organized into 7 chapters that cover hacking tools such as Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. PowerPoint slides are available for use in class. This book is an ideal reference for security consultants, beginning InfoSec professionals, and students. Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases. Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University. Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.

Hacking Web Apps

Hacking Web Apps Book
Author : Mike Shema
Publisher : Newnes
Release : 2012-09-12
ISBN : 159749951X
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

HTML5 -- HTML injection & cross-site scripting (XSS) -- Cross-site request forgery (CSRF) -- SQL injection & data store manipulation -- Breaking authentication schemes -- Abusing design deficiencies -- Leveraging platform weaknesses -- Browser & privacy attacks.

Client Side Attacks and Defense

Client Side Attacks and Defense Book
Author : Sean-Philip Oriyano,Robert Shimonski
Publisher : Newnes
Release : 2012-10-10
ISBN : 1597495905
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Individuals wishing to attack a company's network have found a new path of least resistance-the end-user. A client- side attack is one that uses the inexperience of the end-user to create a foothold in the user's machine and therefore the network. Client-side attacks are everywhere and hidden in plain sight. Common hiding places are malicious Web sites and spam. A simple click of a link will allow the attacker to enter. This book presents a framework for defending your network against these attacks in an environment where it might seem impossible. The most current attacks are discussed along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. The severity of these attacks is examined along with defenses against them, including antivirus and anti-spyware, intrusion detection systems, and end-user education.

Kismet Hacking

Kismet Hacking Book
Author : Frank Thornton,Michael J. Schearer,Brad Haines
Publisher : Syngress
Release : 2008-08-08
ISBN : 9780080558707
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend. *Wardrive Running Kismet from the BackTrack Live CD *Build and Integrate Drones with your Kismet Server *Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive

Securing VoIP Networks

Securing VoIP Networks Book
Author : Peter Thermos,Ari Takanen
Publisher : Pearson Education
Release : 2007-08-01
ISBN : 0132702304
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users. 1 Introduction 2 VoIP Architectures and Protocols 3 Threats and Attacks 4 VoIP Vulnerabilites 5 Signaling Protection Mechanisms 6 Media Protection Mechanisms 7 Key Management Mechanisms 8 VoIP and Network Security Controls 9 A Security Framework for Enterprise VoIP Networks 10 Provider Architectures and Security 11 Enterprise Architectures and Security

7 Deadly Scenarios

7 Deadly Scenarios Book
Author : Andrew Krepinevich
Publisher : Bantam
Release : 2009-01-27
ISBN : 0553905619
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

A global pandemic finds millions swarming across the U.S. border. Major American cities are leveled by black-market nukes. China’s growing civil unrest ignites a global showdown. Pakistan’s collapse leads to a hunt for its nuclear weapons. What if the worst that could happen actually happens? How will we respond? Are we prepared? These are the questions that Andrew F. Krepinevich asks—and answers—in this timely and often chilling book. As a military expert and consultant, Krepinevich must think the unthinkable based on the latest intelligence and geopolitical trends—and devise a response in the event our worst nightmares become reality. As riveting as a thriller, 7 Deadly Scenarios reveals the forces—both overt and covert—that are in play; the real ambitions of world powers, terrorist groups, and rogue states; and the actions and counteractions both our enemies and our allies can be expected to take—and what we must do to prepare before it’s too late.

Computers at Risk

Computers at Risk Book
Author : National Research Council,Division on Engineering and Physical Sciences,Computer Science and Telecommunications Board,Commission on Physical Sciences, Mathematics, and Applications,System Security Study Committee
Publisher : National Academies Press
Release : 1990-02-01
ISBN : 0309043883
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.

The Seven Deadly Sins

The Seven Deadly Sins Book
Author : Nakaba Suzuki
Publisher : Kodansha Comics
Release : 2015-12
ISBN : 1682330230
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

When they were accused of trying to overthrow the monarchy, the feared warriors the Seven Deadly Sins were sent into exile. Princess Elizabeth discovers the truth—the Sins were framed by the king's guard, the Holy Knights—too late to prevent them from assassinating her father and seizing the throne! Now the princess is on the run, seeking the Sins to help her reclaim the kingdom. But the first Sin she meets, Meliodas, is a little innkeeper with a talking pig. He doesn't even have a real sword! Have the legends of the Sins' strength been exaggerated … ? Prepare to get swept away by an epic fantasy story and colorful cast of characters that will rewrite the history of manga as we know it!

Digital Forensics and Cyber Crime

Digital Forensics and Cyber Crime Book
Author : Petr Matoušek,Martin Schmiedecker
Publisher : Springer
Release : 2018-01-04
ISBN : 3319736973
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

This book constitutes the refereed proceedings of the 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017, held in Prague, Czech Republic, in October 2017. The 18 full papers were selected from 50 submissions and are grouped in topical sections on malware and botnet, deanonymization, digital forensics tools, cybercrime investigation and digital forensics triage, digital forensics tools testing and validation, hacking

Information Technology New Generations

Information Technology   New Generations Book
Author : Shahram Latifi
Publisher : Springer
Release : 2017-07-15
ISBN : 3319549782
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

This volume presents a collection of peer-reviewed, scientific articles from the 14th International Conference on Information Technology – New Generations, held at the University of Nevada at Las Vegas on April 10–12, at Tuscany Suites Hotel in Las Vegas. The Book of Chapters addresses critical areas of information technology including web technology, communications, computing architectures, software engineering, security, and data mining.

Cyber Physical Systems

Cyber Physical Systems Book
Author : Uzzal Sharma,Parma Nand,Jyotir Moy Chatterjee,Vishal Jain,Noor Zaman Jhanjhi,R. Sujatha
Publisher : John Wiley & Sons
Release : 2022-06-28
ISBN : 1119836611
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

CYBER-PHYSICAL SYSTEMS The 13 chapters in this book cover the various aspects associated with Cyber-Physical Systems (CPS) such as algorithms, application areas, and the improvement of existing technology such as machine learning, big data and robotics. Cyber-Physical Systems (CPS) is the interconnection of the virtual or cyber and the physical system. It is realized by combining three well-known technologies, namely “Embedded Systems,” “Sensors and Actuators,” and “Network and Communication Systems.” These technologies combine to form a system known as CPS. In CPS, the physical process and information processing are so tightly connected that it is hard to distinguish the individual contribution of each process from the output. Some exciting innovations such as autonomous cars, quadcopter, spaceships, sophisticated medical devices fall under CPS. The scope of CPS is tremendous. In CPS, one sees the applications of various emerging technologies such as artificial intelligence (AI), Internet of Things (IoT), machine learning (ML), deep learning (DL), big data (BD), robotics, quantum technology, etc. In almost all sectors, whether it is education, health, human resource development, skill improvement, startup strategy, etc., one sees an enhancement in the quality of output because of the emergence of CPS into the field. Audience Researchers in Information technology, artificial intelligence, robotics, electronics and electrical engineering.

Online Gambling and Crime

Online Gambling and Crime Book
Author : James Banks
Publisher : Routledge
Release : 2016-05-13
ISBN : 1317085604
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

Offering the first empirically driven assessment of the development, marketisation, regulation and use of online gambling organisations and their products, this book explores the relationship between online gambling and crime. It draws upon quantitative and qualitative data, including textual and visual analyses of e-gambling advertising and the records of player-protection and standards organisations, together with a virtual ethnography of online gambling subcultures, to examine the ways in which gambling and crime have been approached in practice by gamers, regulatory agencies and online gambling organisations. Building upon contemporary criminological theory, it develops an understanding of online gambling as an arena in which risks and rewards are carefully constructed and through which players navigate, employing their own agency to engage with the very real possibility of victimisation. With attention to the manner in which online gambling can be a source of criminal activity, not only on the part of players, but also criminal entrepreneurs and legitimate gambling businesses, Online Gambling and Crime discusses developments in criminal law and regulatory frameworks, evaluating past and present policy on online gambling. A rich examination of the prevalence, incidence and experience of a range of criminal activities linked to gambling on the Internet, this book will appeal to scholars and policy makers in the fields of sociology and criminology, law, the study of culture and subculture, risk, health studies and social policy.

The Pandemic Century One Hundred Years of Panic Hysteria and Hubris

The Pandemic Century  One Hundred Years of Panic  Hysteria  and Hubris Book
Author : Mark Honigsbaum
Publisher : W. W. Norton & Company
Release : 2019-04-09
ISBN : 0393254763
Language : En, Es, Fr & De

DOWNLOAD

Book Description :

With a New Chapter and Updated Epilogue on Coronavirus A Financial Times Best Health Book of 2019 and a New York Times Book Review Editors’ Choice "Honigsbaum does a superb job covering a century’s worth of pandemics and the fears they invariably unleash." —Howard Markel, MD, PhD, director of the Center for the History of Medicine, University of Michigan How can we understand the COVID-19 pandemic? Ever since the 1918 Spanish influenza pandemic, scientists have dreamed of preventing such catastrophic outbreaks of infectious disease. Yet despite a century of medical progress, viral and bacterial disasters continue to take us by surprise, inciting panic and dominating news cycles. In The Pandemic Century, a lively account of scares both infamous and less known, medical historian Mark Honigsbaum combines reportage with the history of science and medical sociology to artfully reconstruct epidemiological mysteries and the ecology of infectious diseases. We meet dedicated disease detectives, obstructive or incompetent public health officials, and brilliant scientists often blinded by their own knowledge of bacteria and viruses—and see how fear of disease often exacerbates racial, religious, and ethnic tensions. Now updated with a new chapter and epilogue.