// Comparison
The Art of Mac Malware, Volume 1 vs Techniques virales avancées: Which Should You Read?
Two cybersecurity books on Malware, compared honestly: who each is for, what each does best, and which to read first.
The Guide to Analyzing Malicious Software
Patrick Wardle
Patrick Wardle's deep dive on macOS malware analysis: persistence patterns, injection techniques, anti-analysis tricks, and the macOS-specific tooling needed to triage real samples.
Specialized follow-up to Filiol's Les virus informatiques. Dives into advanced malicious-code attack techniques and their defensive analysis.
Read this if
Skip this if
Key takeaways
- Mach-O analysis differs from PE analysis in non-trivial ways; the chapters on entitlements, code signing, and notarization are the practical foundation.
- macOS persistence has its own taxonomy (LaunchAgents, LaunchDaemons, login items, period plists, dylib hijacks); learning it is half the analyst's job.
- Apple's own tooling (Console.app, sample, fs_usage, Endpoint Security framework) is the right starting toolkit for triage; Wardle's framing is the cleanest in print.
- Offense/defense companion to the same school — one of the few French-language titles that goes to this level of detail.
- Particularly useful for understanding older classes of evasion techniques that resurface in modern implants.
- Together with Les virus informatiques, the most complete French-language academic foundation on the topic.
How they compare
The Art of Mac Malware, Volume 1 and Techniques virales avancées are both rated 4/5 in our catalog. Pick by topic preference and reading style rather than by rating.
Both books target advanced-level readers, so the choice is about topic, not difficulty.
The Art of Mac Malware, Volume 1 and Techniques virales avancées both cover Malware, Reverse Engineering, so reading them in sequence reinforces the same material from different angles.
Keep reading
The Art of Mac Malware, Volume 1
→ Alternatives to The Art of Mac Malware, Volume 1→ What to read after The Art of Mac Malware, Volume 1Techniques virales avancées
→ Alternatives to Techniques virales avancées→ What to read after Techniques virales avancées