// Comparison
How Cybersecurity Really Works vs Web Security for Developers: Which Should You Read?
Two cybersecurity books on Defensive, compared honestly: who each is for, what each does best, and which to read first.
Sam Grubb's gentle, exercise-driven introduction for non-specialists who need a working mental model of attacker behaviour and basic defence.
Malcolm McDonald's developer-side primer on the OWASP-class issues, framed around real attacks and defended with code patterns rather than vendor products.
Read this if
Skip this if
Key takeaways
- The chapter on threat modeling for individuals (not companies) is the one most teachers steal from: how to think about your own digital risk.
- The hands-on labs at the end of each chapter make the book usable for actual classroom teaching, not just self-study.
- Strikes the rare balance between respects-the-reader and explains-what-an-IP-address-is. Most beginner books fail one or the other.
- The framing "real threats, practical defense" is the book's design choice and its strongest pedagogical move; every chapter starts with the attack and ends with the defensive code pattern.
- Web security is mostly the same dozen mistakes for two decades; once you know the taxonomy, modern variants are recognizable.
- The chapter on session management and the chapter on third-party JS are the two highest-leverage pieces of the book for engineers who already know the basics.
How they compare
How Cybersecurity Really Works and Web Security for Developers are both rated 4/5 in our catalog. Pick by topic preference and reading style rather than by rating.
Both books target beginner-level readers, so the choice is about topic, not difficulty.
How Cybersecurity Really Works and Web Security for Developers both cover Defensive, so reading them in sequence reinforces the same material from different angles.
Keep reading
How Cybersecurity Really Works
→ Alternatives to How Cybersecurity Really Works→ What to read after How Cybersecurity Really WorksWeb Security for Developers
→ Alternatives to Web Security for Developers→ What to read after Web Security for Developers