Lo que yo te recomendaría es que leas unos cuantos libros no se si tienes conociemitos de ingles si es así te dejo esta lista de libros mejor dicho una pequeña libreria para que leas los que más te interesen
Stealing the network how to own an identity pdf book
http://www.hlrse.net/offlinewebpages/Stealing%20the%20Network%20How%20to%20Own%20an%20Identity.pdfStealing the network how to own a continent pdf book
http://www.hlrse.net/offlinewebpages/Stealing%20the%20Network%20How%20to%20Own%20a%20Continent.pdfHack Proofing your Network pdf book
http://hackbbs.org/article/book/Hack%20Proofing%20-%20Your%20Network%20-%20Internet%20Tradecraft.pdfWar Driving and Penetration pdf book
http://em3rgency.com/wp-content/uploads/2012/12/WarDriving-and-Penetration.pdfLow Tech Hacking -Street Smarts for Security Professionals [NepsterJay].pdf 32 MB
Low.Tech.Hacking.epub 4 MB
Low.Tech.Hacking.pdf 8 MB
Security and Hacking Books 01
Syngress - Aggressive Network Self-Defense.pdf 83 MB
Syngress - Best Damn Windows Server 2003 Book Period.pdf 21 MB
Syngress - Botnets - The Killer Web App.pdf 7 MB
Syngress - Buffer Overflow Attacks.pdf 5 MB
Syngress - Building DMZs for Enterprise Networks.pdf 12 MB
Syngress - Building SANs with Brocade Fabric Switches.pdf 4 MB
Syngress - Building a VoIP Network with Multimedia Communication Server 5100.pdf 17 MB
Syngress - C#.NET Web Developer's Guide.pdf 7 MB
Syngress - Check Point NG VPN-1 FireWall-1 Advanced Configuration and Troubleshooting.pdf 12 MB
Syngress - Cisco Security - Professional's Guide to Secure Intrusion Detection Systems.pdf 15 MB
Syngress - Cisco Security - Specialist's Guide to PIX Firewalls.pdf 11 MB
Syngress - Combating Spyware in the Enterprise.pdf 8 MB
Syngress - Creating Security Policies and Implementing Identity Management with Active Directory.pdf 3 MB
Syngress - Cyber Adversary Characterization - Auditing the Hacker Mind.pdf 4 MB
Syngress - Cyber Crime Investigations.pdf 9 MB
http://boanchanggo.tistory.com/attachment/mk7.pdfSyngress - Cyber Spying - Tracking your Family's Secret Online Lives.pdf 106 MB
Syngress - Developer's Guide to Web Application Security.pdf 11 MB
Syngress - Email Virus Protection Handbook.pdf 6 MB
http://www.thehackademy.net/madchat/vxdevl/library/E-mail%20Virus%20Protection%20Handbook.pdfSyngress - Enemy at the Water Cooler.pdf 6 MB
Syngress - Essential Computer Security.pdf 8 MB
Syngress - Google Hacking for Penetration Tester - Vol.1.pdf 13 MB
Syngress - Google Hacking for Penetration Tester - Vol.2.pdf 15 MB
Syngress - Google Talking.pdf 8 MB
Syngress - Hack Proofing Linux.pdf 12 MB
Syngress - Hack Proofing Sun Solaris.pdf 7 MB
Syngress - Hack Proofing Windows 2000 Server.pdf 12 MB
Syngress - Hack Proofing XML.pdf 7 MB
Syngress - Hack Proofing your Identity in the Information Age.pdf 9 MB
Syngress - Hack Proofing your Network - 2nd Edition.pdf 9 MB
http://www.nettech.in/e-books/Hack-Proofing-Your-Network.pdfSyngress - Hack Proofing your Web Applications.pdf 9 MB
Syngress - Hack Proofing your Wireless Network.pdf 7 MB
http://www.microalcarria.com/descargas/documentos/Wireless/Hack%20Proofing%20Your%20Wireless%20Network.pdfSyngress - Hack Proofing your network.pdf 3 MB
Syngress - Hack the Stack.pdf 7 MB
https://am4wuhz3zifexz5u.onion.to/Library/English/Computing/Hack%20The%20Stack%20-%20Using%20Snort%20And%20Ethereal%20To%20Master%20The%208%20Layers%2Syngress - How to Cheat at Securing a Wireless Network.pdf 12 MB
Syngress - InfoSec Career Hacking - Sell your Skillz not your Soul.pdf 84 MB
Syngress - Intrusion, Prevention and Active Response.pdf 85 MB
Syngress - LEGO Software Power Tools.pdf 15 MB
http://wikirobokomp.ru/images/a/a4/LEGO_Software_Power_Tool_(2002).pdf
Syngress - Linksys WRT54G Ultimate Hacking.pdf 16 MB
Syngress - Metasploit Toolkit for Penetration Testing, Exploit Development and Vulnerability Research.pdf 5 MB
http://rogunix.com/docs/Pentesting/Metasploit%20Toolkit%20for%20Penetration%20Testing,%20Exploit%20Development,%20&%20Vulnerability%20Research.pdfSyngress - Microsoft Vista for IT Security Professionals.pdf 19 MB
Syngress - Nessus Network Auditing.pdf 5 MB
Syngress - Ninja Hacking - Unconventional Penetration Testing Tactics and Techniques.pdf 10 MB
Syngress - Nmap in the Enterprise - Your Guide to Network Scanning.pdf 6 MB
Syngress - OS X for Hackers at Heart.pdf 15 MB
http://cdn.preterhuman.net/texts/underground/hacking/OS_X_For_Hackers_At_Heart_2005.pdfSyngress - Penetration Tester's Open Source Toolkit - Vol.1.pdf 34 MB
Syngress - Penetration Tester's Open Source Toolkit - Vol.2.pdf 27 MB
Syngress - Phishing Exposed.pdf 8 MB
Syngress - Practical VoIP Security.pdf 10 MB
Syngress - Programmer's Ultimate Security Deskref.pdf 5 MB
Syngress - RFID Security.pdf 6 MB
Syngress - SQL Injection Attacks and Defense.pdf 7 MB
http://adrem.ua.ac.be/sites/adrem.ua.ac.be/files/sqlinjbook.pdfSyngress - Scene of the Cybercrime - Computer Forensics Handbook.pdf 5 MB
Syngress - Scripting VMware Power Tools.pdf 5 MB
Syngress - Secure Your Network for Free.pdf 7 MB
Syngress - Securing the Cloud - Cloud Computer Security Techniques and Tactics.pdf 3 MB
Syngress - Security Assessment Case Studies for Implementing the NSA IAM.pdf 5 MB
https://www.google.com.gt/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDAQFjAA&url=http%3A%2F%2Fvirtualitera.freeweb7.com%2Fsite%2Fdownload.php%3Ffname%3D.%2Fbiblioteca%2Fsyngress%2520-%2520security%2520assessment%2520case%2520studies%2520for%2520implementing%2520the%2520nsa%2520iam.pdf&ei=que1UufVENSOkAf9poC4CQ&usg=AFQjCNF1AW7VQpJfXItzJeSxB1LYy1NrGw&bvm=bv.58187178,d.eW0Syngress - Security Log Management - Identifying Patterns in the Chaos.pdf 7 MB
Syngress - Security Sage's Guide to Hardening the Network.pdf 11 MB
Syngress - Security+ Study Guide.pdf 11 MB
http://www.mums.ac.ir/shares/hit/eduhit/book/security-study-guide.pdfSyngress - Snort 2.0 Intrusion Detection.pdf 7 MB
Syngress - Snort 2.1 Intrusion Detection - 2nd Edition.pdf 12 MB
Syngress - Snort IDS and IPS Toolkit.pdf 8 MB
Syngress - Sockets, Shellcode, Porting and Coding - Reverse Engineering Exploits.pdf 112 MB
Syngress - Special Ops - Host and Network Security for Microsoft, UNIX, and Oracle.pdf 17 MB
Syngress - 9 MB
Syngress - Stealing the Network - How to Own the Box.pdf 5 MB
http://mirror7.meh.or.id/ebooks/Stealing_the_Network_-_How_to_Own_the_Box_(Syngress-2003).pdf
Syngress - Systems Security Certification Practitioner Study Guide.pdf 6 MB
http://n-pn.info/repo/HackBBS/HackBBS/Docs_HackAngel/Syngress%20-%20Systems%20Security%20Certification%20Practitioner%20Study%20Guide.pdfSyngress - Techno Security's Guide to Managing Risks.pdf 16 MB
Syngress - The Mezonic Agenda - Hacking the Presidency.pdf 16 MB
Syngress - VB.NET Developer's Guide.pdf 6 MB
Syngress - WarDriving and Wireless Penetration Testing.pdf 21 MB
Syngress - Wireless Hacking - Projects for Wi-Fi Enthusiasts.pdf 18 MB
http://cdn.preterhuman.net/texts/underground/hacking/Wireless_Hacking_Projects_for_Wi-Fi_Enthusiasts_2004.pdfSyngress - Wireshark and Ethereal - Network Protocol Analyzer Toolkit.pdf 13 MB
Syngress - Writing Security Tools and Exploits.pdf 11 MB
http://n-pn.info/repo/HackBBS/HackBBS/Docs_HackAngel/Syngress%20-%20Writing%20Security%20Tools%20and%20Exploits.pdfSyngress - XSS Attacks.pdf 7 MB
http://rogunix.com/docs/WebSecurity/XSS%20Attacks%20-%20Exploits%20and%20Defense.pdfSyngress - Zen and the Art of Information Security.pdf 5 MB
Syngress - Zero Day Exploit - Countdown to Darkness.pdf 4 MB
http://library.back2hack.cc/books/Other/Syngress_-_Zero_Day_Exploit_-_Countdown_to_Darkness_[]_(2004)_en.pdf
The Hackademy - Hors Serie 1.pdf 12 MB
The Hackademy - Hors Serie 2.pdf 36 MB
The Hackademy - Hors Serie 3.pdf 14 MB
The Hackademy Prog - Apprendre à Programmer en C.pdf 14 MB
The Hackademy Prog - Apprendre à Programmer en PHP.pdf 34 MB
The Hackademy School - Hack Newbie.pdf 3 MB
The Hackademy School - Hack Security Pro.pdf 6 MB
http://em3rgency.com/wp-content/uploads/2012/12/Techno-Security%E2%80%99s-Guide-to-Risks.pdfhttp://repo.zenk-security.com/Magazine%20E-book/The%20hackademy%20Hors%20Serie%201.pdfCyber Spying - Tracking your Family's Secret Online Lives
http://learn.antix.or.id/scut/tracking-family.PDF- Google Hacking for Penetration Tester - Vol.2.pdf
http://rogunix.com/docs/Pentesting/Google%20Hacking%20for%20Penetration%20Testers,%20Vol.%202.pdfhttp://leetupload.com/database/Misc/Papers/tlf-spusd.pdfScene of the Cybercrime - Computer Forensics Handbook.pdf
http://www.dvara.net/hk/Syngress%20Scene%20of%20the%20CyberCrime.pdfPACKT BOOKS
Overview of Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
http://em3rgency.com/wp-content/uploads/2012/12/advancedpenetrationtestingforhighly-securedenvironments-120827210724-phpapp01.pdfOverview of Metasploit Penetration Testing Cookbook, Second Edition
http://mirror7.meh.or.id/Magazines/hakin9/Packtpub.Metasploit.Penetration.Testing.Cookbook.Jun.2012.pdfOverview of Windows Server 2012 Unified Remote Access Planning and Deployment
http://dl.e-book-free.com/2013/07/windows_server_2012_unified_remote_access_planning_and_deployment.pdfThe Art of
Intrusion by Kevin Mitnick
https://www.google.com.gt/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCsQFjAA&url=http%3A%2F%2Fdeathmule.nullfile.com%2Fdocuments%2Ftaoi.pdf&ei=Dp6_Ur_1NszMkQeD3IBg&usg=AFQjCNGy7aRZmv77LvqqI8OpCwtEE2q42Q&bvm=bv.58187178,d.eW0La mayoría de los libros anteriores los encuentras googleando algunos aun no los he encontrado algotros no los he buscado aun en este link de mega encuentras algunos que no he mencionado
https://mega.co.nz/#F!xo1xSDqI!VxgIf1UH2cQ0qWIfBrwLGA si no tienes conocimientos de ingles puedes usar un traductor en línea como el de systran que es gratuito para traducir un libro que te interese saludos.