Linux Kernel Development (3rd Edition)
The Linux Command Line.
BlackHat Hacking - Hacking VoIP.
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
Stratfor Forensic Hack Investigation - Verizon
The Hackers Underground Handbook.
Shellcode Disassembling - Reverse Engineering
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
A Scientific Dissent From Darwinism
The Dark Arts of Hacking.
Hacking Web Aplications using Cookie Poisoning
Mastering Metasploit
Design and Implementation of Shellcodes.