// Alternatives
Alternatives to Alice and Bob Learn Application Security
Books in our catalog with overlapping topics and a similar reading level to Alice and Bob Learn Application Security. If Alice and Bob Learn Application Security is the wrong fit at beginner level, start here.
01 · 2021
How Cybersecurity Really Works
Sam Grubb's gentle, exercise-driven introduction for non-specialists who need a working mental model of attacker behaviour and basic defence.
Beginner4/5Sam Grubb02 · 2019
Foundations of Information Security
Jason Andress' compact tour of the field: confidentiality / integrity / availability, identification and authentication, network and OS controls, written for newcomers and adjacent disciplines.
Beginner4/5Jason Andress03 · 2019
The Pragmatic Programmer
Thomas and Hunt's career-defining set of practical heuristics for writing software professionally — orthogonality, broken-windows, DRY, tracer bullets, and the underlying argument that craftsmanship is a posture, not a process.
Beginner5/5David Thomas, Andrew Hunt04 · 2021
Real-World Cryptography
David Wong's hands-on tour of the cryptographic primitives, protocols and pitfalls that show up in actual production systems, with deliberate attention to TLS, Noise, modern AEAD, and post-quantum.
Intermediate5/5David Wong05 · 2025
Linux Basics for Hackers
OccupyTheWeb's introduction to Linux from the angle that hackers and pentesters actually need it: shells, networking, scripting, and Kali tooling.
Beginner4/5OccupyTheWeb06 · 2020
Web Security for Developers
Malcolm McDonald's developer-side primer on the OWASP-class issues, framed around real attacks and defended with code patterns rather than vendor products.
Beginner4/5Malcolm McDonald07 · 2018
Click Here to Kill Everybody
Bruce Schneier's policy-level argument that as everything becomes a computer (cars, medical devices, infrastructure, voting), the security failures that used to merely cost us money will start costing lives — and the regulatory shape of that future is being decided now.
Beginner4/5Bruce Schneier08 · 2018
Social Engineering
Christopher Hadnagy's broad procedural reference on social engineering as a discipline — recon, pretexting, elicitation, microexpressions, and the structured engagement model his consultancy operationalized.
Intermediate4/5Christopher Hadnagy09 · 2002
The Art of Deception
Kevin Mitnick and William Simon's case-study collection of social-engineering attacks: PBX scams, helpdesk impersonation, dumpster-diving, the casual lies that sound true. The technology dates the book; the human side is timeless.
Beginner4/5Kevin Mitnick, William L. Simon10 · 2018
Cybersécurité — Un ouvrage unique pour les managers
French-language management-oriented cybersecurity handbook by Hennion and Makhlouf: governance, ISO 27001, risk management, GDPR, business continuity — operational panorama, no technical depth.
Beginner3/5Romain Hennion, Anissa Makhlouf