// Comparison
Real-World Cryptography vs The Mobile Application Hacker's Handbook: Which Should You Read?
Two cybersecurity books on AppSec, compared honestly: who each is for, what each does best, and which to read first.
David Wong's hands-on tour of the cryptographic primitives, protocols and pitfalls that show up in actual production systems, with deliberate attention to TLS, Noise, modern AEAD, and post-quantum.
Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
Chell, Erasmus, Colley, and Whitehouse's reference on iOS and Android application security from the early-mid 2010s — runtime hooking, transport security, IPC abuse, and the platform-specific surface of mobile pentesting.
Read this if
Skip this if
Key takeaways
- Most crypto vulnerabilities are misuse, not broken primitives; Wong's framing of "what to use, what to avoid" is the cleanest in print.
- TLS 1.3, Noise, and Signal-style protocols compose primitives in patterns engineers should recognise on sight, this book teaches the patterns.
- Post-quantum cryptography is no longer optional reading; the book introduces the lattice and hash-based constructions you'll be deploying within a few years.
- The platform-defaults-and-pitfalls structure is durable: each platform's security model is still best understood through the same lens the book uses.
- IPC, deep-link, and inter-app surface remain the highest-yield mobile attack surfaces, even though the specific APIs have changed.
- Pair every chapter with current OWASP MASTG / MASVS material; the conceptual map is the book's value, the specific tooling is not.
How they compare
We rate Real-World Cryptography higher (5/5 against 3/5 for The Mobile Application Hacker's Handbook). For most readers, that means Real-World Cryptography is the primary pick and The Mobile Application Hacker's Handbook is a useful follow-up.
Both books target intermediate-level readers, so the choice is about topic, not difficulty.
Real-World Cryptography and The Mobile Application Hacker's Handbook both cover AppSec, so reading them in sequence reinforces the same material from different angles.
Keep reading
Real-World Cryptography
→ Alternatives to Real-World Cryptography→ What to read after Real-World CryptographyThe Mobile Application Hacker's Handbook
→ Alternatives to The Mobile Application Hacker's Handbook→ What to read after The Mobile Application Hacker's Handbook