otro copy paste que no necesita mas descripcion Impresionante recopilatorio con el top 100 de libros de hacking del blog de Raj Chandel: Kali Linux – Assuring Security by Penetration Testing Network Analysis Using Wireshark Cookbook Computer Security Handbook, 6th Edition iPad and iPhone Kung Fu: Tips, Tricks, Hints, and Hacks for iOS 7 Android Security Cookbook Penetration Testing with BackBox Kali Linux Social Engineering Computer Forensics with FTK Android Hacker’s Handbook Practical Reverse Engineering Malware Forensics Field Guide for Linux Systems Learning Pentesting for Android The Hacker Playbook: Practical Guide To Penetration Testing Learning Metasploit Exploitation and Development Web Penetration Testing with Kali Linux Metasploit Penetration Testing Cookbook Combo Pack (1st+2nd Edition) Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions The Browser Hacker’s Handbook 2014 Hacking Politics The Basics of Web Hacking Tools and Techniques to Attack the Web Investigative Computer Forensics The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives The Basics of Hacking and Penetration Testing, Second Edition Professional Penetration Testing The State of the Art in Intrusion Prevention and Detection Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (Second Edition) Hacking with Kali: Practical Penetration Testing Techniques Wireshark 101: Essential Skills for Network Analysis Hacking Raspberry Pi 2013 Blackhatonomics: An Inside Look at the Economics of Cybercrime Hacking and Securing iOS Applications iOS Hacker’s Handbook Windows Forensics Analysis Toolkit Linux Server Hacks Violent Python – A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Instant Penetration Testing: Setting Up a Test Lab How-to Coding Freedom: The Ethics and Aesthetics of Hacking The Basics of Hacking and Penetration Testing The Unrevealed Secrets of Hacking and Cracking Wireshark Network Analysis – Second Edition The Basics of Information Security Secrets of Network Cartography Seven Deadliest Network Attacks Metaprogramming Ruby: Program Like the Ruby Pros Next-Generation Firewalls for Dummies The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System Hacking Exposed 7: Network Security Secrets & Solutions, Seventh Edition Reversing: Secrets of Reverse Engineering Unauthorised Access – Physical Penetration Testing For IT Security Teams Advanced Penetration Testing for Highly-Secured Environments Gray Hat Python: Python Programming for Hackers and Reverse Engineers Network Forensics Tracking Hackers through Cyberspace Hackin9 Guide to BackTrack Coding For Penetration Testers Practical Malware Analysis Exploiting Software: How to Break Code Hacker’s Delight Hackers Heroes of the Computer Revolution Facebook Hacking E-Book (Free Download) Hacking The Next Generation 24 Deadly Sins of Software Security The Crypter Blue Print Google Hacking for Penetration Tester Wireless Kungfu Networking & Hacking Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground Dark Market- CyberThieves CyberCrime and you Policing Cyber Crime Metasploit (The Penetration Tester’s Guide) The Art of Deception Ghost in the Wires (Free Download) BackTrack 5 Wireless Penetration Testin Windows 7 Tweaks (Best Book for Windows 7 Lovers) Free Download Hacker Highschool (13 Books) Hacking Beware Batch File Programming Windows 7 Bible Two Beginner Guide of Hacking Evolution of Cyber Crime Buffer Overflow Attacks Hacking for Dummies The CEH Prep Guide SQL Injection Attack and Defense Guide to Computer Forensics and Investigation Stealing the Network (E-Book) Cyber Forensics (E-Book) Gmail Hacking (New Hacking E-Book) Hacking Computer forensics Exposed You Tube Hacking (My New E-Book) Footprinting (My New Hacking E-Book) Hacking Exposed (E-Book) Forensic Computer Crime Invsestigation Window Based Command Line Tools (E Book) Hacking GPS (E- Book) Window Based GUI Tools (E Book) Hacker Cracker Penetration Testing Procedures & Methodologies CEH V8 Course + Lab Manual Secure Network Infrastructures by EC-Council Penetration Testing Communication Media Testing Computer Forensics Investigating Wireless Networks and Devices Computer Forensics – Investigating Data and Image Files Fuente: http://www.hackingarticles.in/free-download-top-100-hacking-books/