// Comparison

Click Here to Kill Everybody vs How Cybersecurity Really Works: Which Should You Read?

Two cybersecurity books on Foundations, compared honestly: who each is for, what each does best, and which to read first.

Beginner
4/52018
Click Here to Kill Everybody

Security and Survival in a Hyper-Connected World

Bruce Schneier

Bruce Schneier's policy-level argument that as everything becomes a computer (cars, medical devices, infrastructure, voting), the security failures that used to merely cost us money will start costing lives — and the regulatory shape of that future is being decided now.

Beginner
4/52021
How Cybersecurity Really Works

A Hands-On Guide for Total Beginners

Sam Grubb

Sam Grubb's gentle, exercise-driven introduction for non-specialists who need a working mental model of attacker behaviour and basic defence.

Read this if

Engineers, policy people, and managers who need to brief leadership on why IoT, OT, and cyber-physical systems are categorically different from the IT security they grew up with. Also the right first Schneier book for anyone newly responsible for cyber-physical risk.
Non-engineers who need the field demystified. Grubb is the gentlest serious introduction in print: malware, phishing, network attacks, defenses, all explained in plain language without dumbing down.

Skip this if

Readers wanting hands-on IoT-hacking technique; for that, Practical IoT Hacking (Chantzis et al.) and The Hardware Hacking Handbook are the references. Also dated on specific 2018 examples even though the structural arguments hold.
Engineers, IT people, or anyone who already understands how the internet works. The book assumes nothing; for technical readers it'll feel slow.

Key takeaways

  • Internet+ — Schneier's term for cyber-physical convergence — changes the consequences of security failure, not just the surface.
  • Markets won't fix this; the book's policy argument is that liability, regulation, and procurement standards are the only working levers.
  • Engineering culture and policy culture talk past each other; the book is a useful Rosetta stone in both directions.
  • The chapter on threat modeling for individuals (not companies) is the one most teachers steal from: how to think about your own digital risk.
  • The hands-on labs at the end of each chapter make the book usable for actual classroom teaching, not just self-study.
  • Strikes the rare balance between respects-the-reader and explains-what-an-IP-address-is. Most beginner books fail one or the other.

How they compare

Click Here to Kill Everybody and How Cybersecurity Really Works are both rated 4/5 in our catalog. Pick by topic preference and reading style rather than by rating.

Both books target beginner-level readers, so the choice is about topic, not difficulty.

Click Here to Kill Everybody and How Cybersecurity Really Works both cover Foundations, so reading them in sequence reinforces the same material from different angles.

Keep reading

Related topics