// Comparison

Les virus informatiques : théorie, pratique et applications vs The Mac Hacker's Handbook: Which Should You Read?

Two cybersecurity books on Reverse Engineering, compared honestly: who each is for, what each does best, and which to read first.

Éric Filiol's reference French-language treatment of computer virology. Formal theory, infection mechanisms, offensive and defensive applications, with academic rigor rare on the topic.

Advanced
3/52009
The Mac Hacker's Handbook

Charlie Miller, Dino Dai Zovi

Charlie Miller and Dino Dai Zovi's 2009 deep dive into the Mac OS X exploit landscape — Mach-O, IPC, sandboxing as it then existed, and the early-Intel-Mac exploitation chains.

Read this if

French-reading security students, researchers, advanced malware analysts who want a formal treatment — French-language literature on the topic is thin.
Reverse engineers and exploit developers who want the historical foundation of Mac exploitation, especially as a stepping stone to The Art of Mac Malware (Wardle). Most useful for the conceptual scaffolding around Mach, Objective-C runtimes, and IPC, which are still load-bearing on modern macOS.

Skip this if

Readers looking for a tooling manual or introduction. Filiol writes dense; algorithmic and systems fundamentals are required.
Anyone needing current Apple-silicon, Hardened Runtime, System Integrity Protection, Endpoint Security, or modern sandbox-escape tradecraft. The book is pre-iPhone-era macOS in spirit; 2009 was a different planet.

Key takeaways

  • Prix Roberval 2005 (higher-education category) — one of the few French cyber books awarded at that level.
  • Filiol is a former military cryptanalyst and ran ESAT then ESIEA's virology lab; academic sourcing is visible chapter by chapter.
  • The only French-language book that treats computer virology with university-textbook rigor.
  • The conceptual material (Mach, IPC, Mach-O, Objective-C dispatch) generalizes to modern macOS; the specific exploits do not.
  • Most of the value is historical archaeology — knowing why the macOS sandbox and SIP exist is far easier after this book.
  • Pair with current Wardle and Apple Platform Security material for any operational use; treat this as background reading.

How they compare

We rate Les virus informatiques : théorie, pratique et applications higher (5/5 against 3/5 for The Mac Hacker's Handbook). For most readers, that means Les virus informatiques : théorie, pratique et applications is the primary pick and The Mac Hacker's Handbook is a useful follow-up.

Both books target advanced-level readers, so the choice is about topic, not difficulty.

Les virus informatiques : théorie, pratique et applications and The Mac Hacker's Handbook both cover Reverse Engineering, so reading them in sequence reinforces the same material from different angles.

Keep reading

Related topics