Abaixo segue uma lista com dezenas de livros para download, muitos deles focados em segurança e em temas correlatos a TI.

Para fazer download de cada um destes livros, basta vc clicar neste link, baixar o zip, descompacta-lo, abrir o .pdf e depois, selecionar o que desejas. (até onde eu saiba, múltiplos downloads estão funcionando)

Computer Science:

Foundations Of Computing & The Information Age ISBN: 9780733988486 Artificial Intelligence: A Systems Approach
Ray Kurzweil – The Singularity is Near
Data Clustering, Theory, Algorithms and Applications

CODE, by Petzold
PCs AiO for Dummies 6th Edition RHCSA/RHCE study guide 6th edition,2011

Hacking And Security:

The secret of Hacking 1st Edition
Hack the Stack
Hacker Disassembling Uncovered
Hacking VoIP: Protocols, Attacks and Countermeasures Hacking: The Art of Exploitation, 2nd Edition

Hacking Exposed Windows: Windws Security Secrets & Solutions 3rd edition. Inside A Hacker’s Playbook
Hacking: The Art of Exploitation Live CD [Part 1] [Part 2] [Part 3]
Hacking Raspberry Pi

NSA hacking techniques and countermeasures
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Introduction to Ethical Hacking
Anti-Hacker ToolKit, Third Edition.
Ebook-Comprehensive:Journey of a hacker from Intermediate to elite volume-1
Certified Ethical Hacker – Official Handbook
Google Hacking
Hacking For Dummies – 2nd Edition
Hacking For Dummies – 3rd Edition
Hacking – The Next Generation
The Mac Hacker’s Handbook
Underground Hacking Madness & Obsession on the Electronic Frontier (Suelette Dreyfus & Julian Assange-2001) Wireless Hacks
Certified Ethical Hacker 6
Hackers: Heroes of the Computer Revolution – 25th Anniversary Edition
1000 Hacker Tutorials
Remote Code Execution with ELi
Hacking Exposed Series – nearly all the current books
Hacker magazines [Part 1] [Part 2] [Part 3] [Part 4] [Part 5] [Part 6] [Part 7] [Part 8]
Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
McGraw & Hill: Gray Hat Hacking: 2nd Edition
Ebook: Hacker’s Black Book (ENG/DEU)
The Hacker’s Dictionary
Corporate Computer Security (3rd Edition)
Introduction to Cyber-Warefare: A Multidisciplinary Approach
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
20 hakin9 magazines – includes the hakin9 Bible
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems

Ethical Hacking and Countermeasures: Threats and Defense Mechanisms The hakin9 Bible
Ethical Hacking and Countermeasures: Attack Phases
Chained Exploits: Advanced Hacking Attacks from Start to Finish (2009) Exploiting Software How to Break Code

Buffer Overflow Attacks: Detect, Exploit, Prevent
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure N Hacking Exposed Linux, 3rd Edition
Cracking Passwords Guide
1000 Hacker Tutorials + some tools –
Hacking GMail
The Dark Visitor: Inside the World of Chinese Hackers
We Are Anonymous: Inside the Hacker World of LulzSec , Anonymous, and the Global Hacktivism and Cyberwars: Rebels With a Cause?
The Database Hacker’s Handbook
Hacking/Exploiting/Cheating in Online Games
Exploiting Online Games: Cheating Massively Distributed Systems
Hack THis-24 IncredIble Hackerspace projects from tHe dIY movement
Counter Hack Reloaded, Second Edition
Hack a Mac – With only 30 minutes of Physical Access
How to hack passwords with a USB Drive
E-book for begginers to start learn hacking
The hacker quarterly 2600 1984-2008
Hacking Cable Modems (No Starch Press)
Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security
Hacker’s Delight
A Guide to Kernel Exploitation: Attacking the Core
Seven Deadliest USB Attacks (Syngress Seven Deadliest Attacks Series)
Cyber Security Essentials
The Electronics of Radio – David B. Rutledge
Thor’s Microsoft Security Bible: A Collection of Practical Security Techniques
The Myths of Security: What the Computer Security Industry Doesn’t Want You to K Writing Security Tools And Exploits.
Inside the Security Mind
CMS Security Handbook: Comprehensive Guide WordPress, Joomla, Drupal, Plone Security Power Tools – O’Reilly Media
Exploiting SoftwaHow to Break Code
detecting malice
Defense against the Black Art
Network and System Security, Second Edition by John R. Vacca
Cyber Security and IT Infrastructure Protection by John R. Vacca
Linux Exploits, Stack Overflow [Part 1] [Part 2]
Electronic Warfare in Operations (U.S military manual)
Russian Underground 101
Fuzzing: Brute Force Vulnerability Discovery
Computer Security Fundamentals (2nd Edition)
Computer Security: Art and Science
The Basics of Information Security: Understanding the Fundamentals of InfoSec

Carry On: Sound Advice from Schneier on Security by Bruce Schneier
A Bug Hunter’s Diary: A Guided Tour Through The Wilds Of Software Security Internet Denial of Service: Attack and Defense Mechanisms
EPUB CISSP All-In-One Exam Guide – Shon Harris
PDF CISSP All-In-One Exam Guide – Shon Harris
Cracking Drupal: A Drop in the Bucket
A+, Network+, Security+ Exams in a Nutshell
RTFM Red Team Field Manual
Password Cracking Guide (A To Z Of Password Cracking)
Digital Fortress – Dan Brown PDF
Mafiaboy: How I Cracked the Internet and Why It’s Still Broken
Command and Control in the Fifth Domain
Wired For War
Peter Gutman On Security
Blackhatonomic
Nessus, Snort, & Ethereal Power Tools

Anonymity:

Spy & counter-Spy
Beat the FBI How to Send Anonymous Email Without Getting Caught Practical Anonymity: Hiding in Plain Sight Online
Hack Proofing Your Identity
A tiny pdf on aliens and the NSA
The Burglary: The Discovery of J. Edgar Hoover’s Secret FBI
One Cell is Enough to Break Tor’s Anonymity
Browser Uniqueness: An EFF Article

Foot Printing:

Google Dorks | White Paper (Updated on December 24th)
Google Power Search (2011)
Dangerous Google – Searching ForSecrets
[NSA] Untangling the Web: A Guide to Internet Research
Mechanics of User Identification and Authentication Fundamentals of Identity Man

Social Engineering:

Games People Play: The Psychology Of Human Relationships The Art of Deception
Social Engineering – The Art Of Human Hacking
Unmasking the Social Engineer: MOBI PDF

Social Engineering and Nonverbal Behavior Set Gentleman Bastards 1-3 PDF (A MUST READ!) The Complete Bastard Operator from Hell

[Part 1]

[Part 2]

[Part 3]

[Part 4]

Hacking the Human
Phishing Exposed
Liespotting: Proven Techniques to Detect Deception Paul Ekman Books (Emotions Revealed and Telling Lies)

Web Hacking &Security:

McGrawHill Web Applicatio Security A Beginners Guide
Getting The Hang Of Web Typography (2011) – 10.8 MB
The Tangled Web: A Guide to Securing Modern Web Application
Web Application Defender’s Cookbook: Battling Hackers and Protecting Users Hacking Web Apps: Detecting and Preventing Web Application Security Problems The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Web Application Hackers Handbook
Ethical Hacking and Countermeasures: Web Applications and Data Servers
The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws Instant Burp Suite Starter

SQL Hacks:

From SQL Injection to Shell
SQL Injection Attacks and Defense, 2nd Edition SQL Hacks

XSS:

XSS Attacks – Exploits And Defense

Penetration testing:

Coding for Penetration Testers
The Basics of Hacking and Penetration Testing
The Hacker Playbook: Practical Guide to Penetration Testing
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques Penetration Testing: A Hands-On Introduction to Hacking
Penetration Testing with the Bash Shell
Art of pentesting
Wireless Reconnaissance in Penetration Testing
Hacking with Kali: Practical Penetration Testing Techniques
BackTrack 5 Wireless Penetration Testing Beginner’s Guide
Metasploit: The Penetration Tester’s Guide
Advanced Penetration Testing for Highly-Secured Environments: Ultimate Guide Unauthorized Access for penetration testers
Metasploit: The penetration testers guide
Metasploit Penetration Testing Cookbook
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration T

Penetration Testers Open Source Toolkit (3rd Edition) Backtrack 5 Cookbook

Wireless/Hacking & Security:

Wireless Security 101
Security for Wireless Implantable Medical Devices Guide To Wireless Communications, 3rd Edition Introduction to CDMA Wireless Communications Hacking Exposed Wireless 2nd Edition
CWSP Certified Wireless Security Professional Attacking WPA/WPA2 enterprise networks

Computer Forensics:

Handbook of Digital Forensics and Investigation Information security and anti forensics v2
Information security and anti forensics v3
Mobile Phone Security and Forensics: A Practical Approach The art of memory forensics

Incident Response & Computer Forensics 3rd Edition (Aug 2014) Network Forensics Tracking Hackers through Cyberspace
Windows Registry Forensics
Computer Forensics Investigating Data and Image Files
Computer Forensics Investigating Network Intrusions and CyberCrime Computer Forensics Investigating Hard Disks File and Operating Systems Computer Forensics: Investigating Network Intrusions and Cyber Crime Windows Forensic Analysis

File System Forensic Analysis
Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies

Information Hiding:

Information Hiding Syngress Data Hiding

Cryptography:

Disappearing Cryptography (3rd edition)
Foundations of Cryptography: Volume 1, Basic Tools Computer Security and Cryptography
Understanding Cryptography
Cryptographic Security ArchitectuDesign and Verification Binary An Encrypted to Cipher Bridge Sho – Carolyn McCray Handbook of Applied Cryptography – University of Waterloo Puzzle Encryption Algorithm – Goswell Security Laboratory Beginner to Advanced Cryptography Books
Cryptology Unlocked

Simple Steps to Data Encryption

Reverse Engineering:

Reverse Engineering of Object Oriented Code
Reversing: Secrets of Reverse Engineering
Anti-Reverse Engineering Resource Collection
An Introduction To Reverse Engineering for Beginners
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Reversing Secrets of Reverse Engineering

The IDA Pro Book: The Unofficial Guide to the World’s Most Popular Disassembler 2nd Edition (2011)

Malware/Analysis:

Practical Malware Analysis
Malware Forensics Field Guide for Windows Systems
Computer Viruses and Malware
Malware Analyst Cookbook [Part 1] [Part 2] [Part 3] [Part 4]
The little black book of computer viruses
Computer Viruses, Artificial Life And Evolution-What Computer Viruses Can Teach The Giant Black Book of Computer Viruses 2nd Edition By Mark Ludwig
Computer Viruses for Dummies
The Art of Computer Virus Research and Defense
The Giant Black Book of Computer Viruses
Rootkits: Subverting the Windows Kernel
Designing BSD Rootkits
Managed Code Rootkits
PCI based rootkits
ZeroAccess, an advanced kernel mode rootkit
Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography Exposing Cryptovirology
Identifying Malicious Code Through Reverse Engineering
Botnets: The Killer Web App
Webbots , Spiders, and Screen Scrapers – 2nd Edition

Lock picking:

Practical Lock Picking: A Physical Penetration Tester’s Training Guide Storm Lockpicking Guide [Official]
Lockpicking Detail overkill / Next level
Lockpick templates

The MIT Guide To Lockpicking
LOCKS, SAFES, AND SECURITY: An International Police Reference 2nd Ed. LSS+ [Part 1] [Part 2] Keys to the Kingdom – Imprimare (Lock Security Tech – Key Impressioning)

Programming:

Algorithm & Data Structure:

Introduction to Algorithms
Algorithms in a Nutshell
The Algorithm Design Manual Second Edition

Other stuff:

Code Craft: The Practice of Writing Excellent Code
Clean Code: A Handbook of Agile Software Craftsmanship
Writing Great Code: Volume One
Write Great Code: Volume Two
Seven Languages in Seven Weeks: A Pragmatic Guide to Learning Programming Langua
Silence On The Wire – A Field Guide To Passive Reconnaissance And Ind irec
97 things every programmer should know
Head First – Programming
Software Security: Building Security In
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Why Programs Fail 2nd edition
The Humane Interface: New Directions for Designing Interactive Systems
Think Like A Programmer
Writing Secure Code – 2nd Edition
Programming Your Home Automate with Arduino, Android, and Your Computer
Programming Interviews Exposed: Secrets To Landing Your Next Job, 3rd Edition
Getting Good With Git (2010) – 3.1 MB
programming project ideas (Martyr2’s Mega Project)
Advanced Programming in the UNIX Environment

The Linux Programming Interface: A Linux and UNIX System Programming Handbook
Linux Kernel Development (3rd Edition)
Programming Many-Core Chips

OpenGL Development Cookbook
Object-Oriented Software Engineering
Design Patterns: Elements of Reusable Object-Oriented Software [PDF ] [Interactive CD]
Code Complete: A Practical Handbook of Software Construction, Second Edition
Head First – Design Patterns
Make key generators
Patterns of Enterprise – Application Architecture
O’reilly Regular Expression Pocket Reference
CUDA by Example: An Introduction to General-Purpose GPU Programming

NLP:

NLP books; password: evilzone.org
Introducing NLP
Persuasion Skills Black Book: Practical NLP Language Patterns; password: evilzone.org

Compiler Construction:

Basics of Compiler Design
Structural analysis a new approach to flow analysis in optimizing compilers Compilers: Principles, Techniques and Tools
The art of Computer programming

Vi & Vim:

Practical Vim: Edit Text at the Speed of Thought Hacking Vim 7.2
vi and Vim Editors Pocket Reference, 2nd Edition Learning the vi and Vim Edtors, 7th Edition

C & C++:

C/C++ Programming eBooks Collection
O’Reilly Programming Embedded Systems in C and C++ 1999 – 957 KB O’Reilly Secure Programming Cookbook For C And C++ 2003 – 1.4 MB

C:

C for dummies
C Primer Plus (Mother Fucking Finally)
Let us C (yashwant kanetkar)
21st Century C
C in a Nutshell
C Programming Language (2nd Edition)
Expert C Programming: Deep C Secrets
Functional C
Let us C (yashwant kanetkar)
Solving&design in C 7th ed, starting raspberry pi, working tcp sockets
P.J. Plauger – The Standard C Library
C Language Reference Manual, 5th Edition 2003 – 496 KB
Apress Beginning C, 5th Edition 2013 EPUB – 4.3 MB
Apress Beginning C, 5th Edition 2013 PDF – 3.2 MB
Course Technology C Programming for the Absolute Beginner, 2nd Edition 2008 – 2.2 MB
Deitel C How To Program, 6th Edition 2010+Web Files+Source Code – 16.0 MB
Expert C Programming Deep C Secrets – 2.1 MB
McGraw-Hill C The Complete Reference, 4th Edition 2000 – 3.0 MB
O’Reilly Mastering Algorithms with C 1999 – 2.5 MB
O’Reilly Practical C Programming 3rd Edition 1997 – 5.9 MB
Pearson Problem Solving and Program Design in C, 7th Edition 2013-Jeri R Hanly-Elliot B Koffman – 5.2 MB Prentice-Hall The C Programming Language, 2nd Edition 1988 – 19.2 MB
Sams Teach Yourself C in 21 Days, 6th Edition 2003 – 3.1 MB
Sams Publishing Advanced C 1992 – 2.7 MB
Sams Teach Yourself C in 24 Hours – 621 KB
Wiley C For Dummies 2004 – 2.5 MB
Head First – C [Part 1] >> [Part 2]
X86 Assembly Language and C Fundamentals
Learn C the Hard Way
C in 7 days
P.J. Plauger – The Standard C Library
C Primer Plus 6th Edition
how not to program in c
Applied Cryptography: Protocols, Algorithms and Source Code in C
C: The Complete Reference, 4th Ed
Mastering algorithms with C
Programming in C, 3rd Edition

C++:

C++ Primer Plus [6th Edition]

Absolute C++, 5th Edition
Starting Out With C++
[C++11]The C++ Standard Library – A Tutorial and Reference, 2nd Edition
C++ Without Fear
Programming: Principles and Practice Using C++ (Bjarne Stroustrup)
C++ Primer ( 5 Edition-2012 ) [Part 1] [Part 2]
Ivor Horton’s Beginning Visual C++ 6
Optimizing software in C++
Structured Programming with c++
Thinking in c++
Cryptography in C and C++ Second Edition
Secure Programming Cookbook for C and C++
Jumping into C++
Effective C++, second edition
Addison-Wesley C++ Primer Plus, 6th Edition 2011 PDF Source Code – 5.9 MB
Addison-Wesley C++ Primer, 5th Edition 2012 – 49.6 MB [Part 1] [Part 2]
Addison-Wesley The C++ Programming Language 4th Edition Jun 2013 – 6 1 MB
Addison-Wesley The C++ Standard Library, 2nd Edition 2012 – 6.1 MB
Apress Cryptography in C and C++ 2001 – 3.6 MB
Course Technology An Introduction to Programming With C++, 6th Edition D. Zak 2011 – 5.8 MB
Course Technology Beginning C++ Through Game Programming, 3rd Edition 2011 – 3.2 MB
Course Technology C++ Programming From Problem Analysis to Program Design, 5th Edition D.S. Malik 2011 – 5.2 MB Course Technology C++ Programming From Problem Analysis to Program Design, 6th Edition D.S.Malik 2013 – 4.8 MB Course Technology C++ Programming Program Design Including Data Structures, 6th Edition D.S. Malik 2013 – 13.2 MB Deitel C++ How to Program, 8th Edition 2012 – 51.5 MB [Part 1] [Part 2]
McGraw-Hill C++ The Complete Reference, 4th Edition 2003 – 2.3 MB
McGraw-Hill C++ A Beginners Guide, 2nd Edition Herbert Schildt 2003 +Source Code+Answers+Corrections – 9.7 MB McGraw-Hill C++ Demystified A Self-Teaching Guide 2004 – 2.6 MB
McGraw-Hill Herb Schildts C++ Programming Cookbook 2008 – 1.8 MB
McGraw-Hill The Art Of C++ Herb Schildts 2004 – 1.1 MB
O’Reilly C++ Cookbook 2005 – 946 KB
Packt Publishing Boost Asio C++ Network Programming 2013 – 3.6 MB
Pearson Absolute C++, 5th Edition Walter Savitch 2012 – 3.8 MB
Pearson Problem Solving with C++, 7th Edition Walter Savitch 2009 – 3.3 MB
Prentice-Hall Data Structures and Program Design in C++ 2000 – 11.6 MB
Prentice-Hall C++ Without Fear A Beginners Guide, 2nd Edition 2011 – 3.1 MB
Que Publishing C++ by Example 1992 – 2.5 MB
Wiley Beginning Programming with C++ For Dummies 2010 – 53.4 MB [Part 1] [Part 2]
Wiley C++ All-In-One Desk Reference For Dummies, 2nd Edition 2009 – 5.9 MB
Wiley C++ For Dummies, 6th Edition 2009 – 1.6 MB
Wiley C++ Timesaving Techniques for Dummies 2005 – 4.4 MB
C++ For Dummies – 5th Edition
Trends and future of C++: Evolving a systems language for performance
C++11 Style – A Touch of Class
Advanced CORBA® Programming with C++
Windows via C/C++
More Effective c++
The C++ programming language, 3rd edition
Practical C++ programming

Sams Teach Yourself C++ In One Hour A Day, 7th Edition 2011 – 4.4 MB C++ in a Nutshell
Data Structures and Algorithm Analysis in C++ (4th Edition)
cplusplus chm reference

Learncpp.com archived

JAVA:

Enterprise JavaBeans 3.0, 6th edition
Enterprise JavaBeans, 4th edition
Java database best practices
Java Software Solutions – Foundations of Program Design, 4th Edition Introduction to programming using Java

Java NIO
Java Web Services
The Linux Cookbook: Tips and Techniques for Everyday Use
Java 7 New Features Cookbook
Oracle Certified Associate, Java SE 7 Programmer Study Guide
Expert Oracle and Java Security: Programming Secure Oracle Database Applications
Killer Game Programming in Java
Programming Scala: Tackle Multi-Core Complexity on the Java Virtual Machine
Java Network Programming, Third Edition
Functional Programming for Java Developers
The Laws of Cryptography with Java Code
Java How to Program (Early Objects) 9e
Java eBooks Collection (2007-2013)
Addison-Wesley Building Java Programs A Back To Basics Approach (2011)
Addison-Wesley Effective Java, 2nd Edition (2008)
Addison-Wesley The Java EE 6 Tutorial, 4th Edition (2011)
Apress Beginning EJB3 Java EE 7 Edition, 2nd Edition (2013)
Apress Beginning Java EE 7 (2013)
Apress Expert Oracle and Java Security Programming Secure Oracle Database Applications with Java (2011) Apress Java 7 for Absolute Beginners (2012)
Apress Java EE 7 Recipes A Problem-Solution Approach (2013)
Apress JavaFX 2 0 Introduction by Example (2011)
Apress Oracle Certified Professional Java SE 7 Programmer Exams 1Z0-804 and 1Z0-805 (2013)
Apress Pro Java 7 NIO.2 (2011)
Apress Pro Java ME Apps (2011)
Apress Pro JavaFX 2 A Definitive Guide to Rich Clients with Java Technology (2012) [Part 1] [Part 2]
Course Technology Java Programming From Problem Analysis to Program Design, 5th Edition – D.S. Malik (2012) Course Technology Java Programming, 6th Edition – Joyce Farrel (2012)
CRC Press Secure Java For Web Development (2011) – Doesn’t exist on the link provided by the OP.
Deitel Developer Series Java For Programmers, 2nd Edition (2012)
Deitel Java How to Program Early Objects, 9th Edition (2012)
Manning Effective Unit Testing A Guide For Java Developers (2013)
Manning OCA Java SE 7 Programmer I Certification Guide (2013)
Manning The Well-Grounded Java Developer (2013)
McGraw Hill The Art Of Java (2004)
McGraw-Hill An Introduction To Object-Oriented Programming With Java, 5th Edition (2010)

Oracle Press Java The Complete Reference, 8th Edition – Herbert Schildt (2011) [Part 1] [Part 2] O’Reilly Functional Programming for Java Developers (2011)
O’Reilly Java 7 Pocket Guide, 2nd Edition (2013)
O’Reilly Java Network Programming, 3rd Edition 2004

O’Reilly Java The Good Parts (2010)
O’Reilly Java Web Services Up and Running (2009)
O’Reilly JavaMail API (2013)
O’Reilly Learning Java, 4th Edition (2013)
Packt Publishing Java 7 Concurrency Cookbook (2012)
Packt Publishing Java 7 New Features Cookbook (2012)
Packt Publishing Oracle Certified Associate Java SE 7 Programmer Study Guide (2012)
Pearson Absolute Java, 5th Edition Walter Savitch (2012)
Pearson Starting Out With Java From Control Structures Through Objects, 5th Edition (2013) [Part 1] [Part 2] Prentice-Hall Core Java Volume I Fundamentals 9th Edition (2013)
Prentice-Hall Core Java Volume II Advanced Features 9th Edition (2013) [Part 1] [Part 2]
Prentice-Hall Introduction to Java Programming Brief Version, 8th Edition – Y.Daniel Liang (2011) Prentice-Hall Introduction to Java Programming Brief Version, 9th Edition – Y.Daniel Liang (2013) Prentice-Hall Introduction to Java Programming Comprehensive Version, 8th Edition – Y.Daniel Liang (2011) Prentice-Hall Introduction to Java Programming Comprehensive Version, 9th Edition – Y.Daniel Liang (2013) Prentice-Hall Introduction to Java Programming Comprehensive Version, 10th Edition – Y.Daniel Liang Prentice-Hall Java An Introduction to Problem Solving and Programming 6th Edition – Walter Savitch (2012) Sams Java Phrasebook (2007)
Sams Teach Yourself Java 6 in 21 Days, 5th Edition (2007)
Sams Teach Yourself Java In 24 Hours, 6th Edition (2012)
Springer An Introduction To Network Programming Using Java, 3rd Edition (2013)
Springer Guide to Web Development with Java (2012)
Wiley Beginning Programming With Java For Dummies, 3rd Edition (2012)
Wiley Java and Mac OS X Developer Reference (2010) [Part 1] [Part 2]
Wiley Java Concepts for Java 5 and 6 5th Ed
Wiley Java For Dummies, 5th Edition (2011)
Wrox Press Ivor Horton’s Beginning Java Java 7 Edition (2011) [Part 1] [Part 2]
Wrox Press Java Programming 24-Hour Trainer (2011)
Programming Spiders, Bots and Aggregators in Java
Arts And Science of Java
Data Structures and Problem Solving Using Java (4th Edition)
J2ME in a Nutshell

C#:

Learning C# 3.0
Learning C# 4.0
Learning C# 3.0
Microsoft Visual C# 2012 Step By Step CLR via C# 3rd edition

C# 5.0 in a Nutshell
Head First – C# [Part 1] >> [Part 2]

Scripting Languages:
Python:
O’Reilly Python for Unix and Linux System Administration
200+ MB Python ebooks
Introduction To Computation And Programming Using Python
How to Think Like a Computer Scientist – Learning with Python Official Python Manual of Python 2.7.6 (Updated on November 10th 2013)
Learn Python The Hard Way 2nd Edition
Python Forensics
Python programming books
Think Python
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
wxPython in Action
wxPython-2.8 Application Development Cookbook – 2010 Foundations of Python Network Programming Second Edition Python Algorithms – Mastering basic algorithms in the python language
Network Hacks: Attack & Defense With Python
Starting Out with Python, Second Edition
“A Byte Of Python” By, Swaroop C H
Game Development in Python.
Cipher hacking in Python.
Beginning python from novice to professional
Core Python Programming (2nd Edition)
Violent Python: A Cookbook for Hackers
Invent your own games with python
Pyomo – Optimization Modeling in Python

The Python Standard Library by Example.
Rapid gui development with QT and python
Practical Programming: An Introduction to Computer Science Using Python
The Python Tutorial
Python in a Nutshell 2nd Edition
Head First – Python
Python and HDF5
Making Games with Python & Pygame

Ruby:

Ruby by Example: Concepts and Code Little Book of Ruby
Ruby Cookbook
Refactoring: Ruby Edition

Build Awesome Command-Line Applications in Ruby Everyday Scripting with Ruby: For Teams, Testers, and You Eloquent Ruby
Learning Ruby
The Ruby Programming Language
Ruby in a Nutshell

Perl:

Wicked Cool Perl Scripts
Perl for beginners
Modern Perl [PDF] [HTML] [EPUB] Programming Pearl, 2nd edition

Web Oriented Languages:

Learning PHP, MySQL, and JavaScript
PHP & MySQL Web Development All-in-One Desk Reference For Dummies

HTML & CSS:

HTML & XHTML: The Definitive Guide (6th Edition)
Decoding HTML5 (2012) – 10.7 MB
Head First – HTML with CSS & XHTML
Head First – HTML5 Programming [Part 1] >> [Part 2] >> [Part 3] CSS Essentials (2012) – 6.0 MB

Scalable And Modular Architecture For CSS – 963 KB CSS and Documents
Mastering CSS for Web Developers (2011) – 10.0 MB HTML & CSS Design and Build Websites

PHP:

PHP Ebooks Collection
Yank Kevin. Php y Mysql. Novice to Ninja. 5th edition. Sitepoint. 2012. 524 pgs Programming PHP, 3rd Edition
Getting Good With PHP (2012) – 2.6 MB
PHP in a Nutshell

Java script:

Modern JavaScript: Develop and Design
teach yourself javascript in 24 hours
JavaScript Step by Step, 2nd Edition
Javascript – step by step, 3th Edition
Eloquent JavaScript: A Modern Introduction to Programming Getting Good With JavaScript + Source (2011) – 1.7 MB Secrets of the JavaScript Ninja + Source Code

Mastering jQuery (2011) – 1.3 MB
Head First – Ajax [Part 1] >> [Part 2]
The Node Beginner Book (2012) – 4.2 MB

Shell Programming:

The Shellcoder’s Handbook: Discovering and Exploiting Security Holes 2nd Ed. Powershell toolmaking in a month of lunches
Shellcoder’s Handbook plus two
Shell Scripting

Sams Teach Yourself Shell Programming in 24 Hours (2nd Edition) The shell coder’s handbook

BASH:

Pro Bash Programming: Scripting the Linux Shell

Batch Programming:

Batch File Programming

Assembly:

The Art Of Assembly Langauge 2nd Editition.
Assembly Language Step by Step-Programming with Linux 3rd edition

X86 Assembly Language and C Fundamentals
Guide to Assembly Language A Concise Introduction
Guide to Assembly Language Programming in Linux
Guide to Assembly Language – A Concise Introduction
Linux Assembly Programming
Professional Assembly Programming(Programmer to Programmer) The Art of Assembly Language
Assembly Language for x86 processors (Sixth edition)
Guide to Assembly Language Programming in Linux
Introduction to 64 Bit Intel Assembly Language Programming for Linux Introduction to 80×86 Assembly Language and Computer Architecture

Other Languages:

Microsoft VBScript: Step by Step
Programming In Lua
Actionscript 3.0
The D Programming Language
The Scheme Programming Language, 4th Edition
The Way to Go: A Thorough Introduction to the Go Programming Language Beginning Visual Basic 2010

Ada Reference Manual

Game Development/Hacking:

Videogame Programming and Hacking EBooks collection Beginners Guide to Blender Game Engine
Programming Game AI by Example
Game Engine Architecture

Breaking Into The Game Industry
Premier Press – Game Programming with Python, Lua, and Ruby Premier Press – MUD Game Programming
XNA 4.0 Game Development by Example, Visual Basic Edition Rules of Play

Networking:

Secrets of Network Cartography
Nmap Network Scanning: The Official Nmap Project Guide
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems Wireshark (R) 101: Essential Skills for Network Analysis
Networking For Dummies 7th Edition
Nmap in the Enterprise. Your Guide to Network Scanning
Ethical Hacking and Countermeasures: Secure Network Infrastructures
Wireshark Network Analysis
Nmap 6: Network Exploration and Security Auditing Cookbook
Building reliable networks with Border Gateway protocol
Nmap 6: Network Exploration and Security Auditing Cookbook

Computer Networks – 5th edition
Hacking a Terror Network – The Silent Threat of Covert Channels
Hack Proofing Your Network (Second Edition)
Comptia Network+ study guide
CompTIA Network+ Lab Manual 3rd Edition – 2012
The Practice of Network Security Monitoring
Head First – Networking
Twisted Network Programming
MTA 98-366 Networking Fundamentals
System-Level Design Methodologies for Telecommunication
Hacking automotive networks and control units
Stealing the Network; How to Own the Box ( Syngress-2003)
Stealing The Network – The Complete Series Collector’s Edition
Computer Networking- A top-down approach featuring the Internet, 1st edition Computer Networking- A top-down approach featuring the Internet, 6th edition Cabling The Complete Guide to Copper and Fiber-Optic Networking 4edition Computer Network Security and Cyber Ethics, 4th ed 2014
Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks)
Hacking Exposed: Network Security Secrets & Solutions, 5th Edition
Network Security First-Step
Cryptography and Network Security Principles (5th Edition)
Maximum Security: A Hacker’s Guide to Protecting Your Internet Site and Network Firewalls And Networks How To Hack Into Remote Computers
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
Illustrated TCP/IP
Working with TCP Sockets
Netcat Power Tools
Instant Netcat Starter
TCP IP foundations
Instant Wireshark Starter
Nmap Cookbook
TCP/IP illustrated vol. 1 – 3
Begineers guide to IP and DNS
The DHCP Handbook
CCNA Explorer [Semester 1] [Semester 2] [Semester 3] [Semester 4]

Hardware:

Hardware Hacking
Hardware Hacking: Have Fun While Voiding Your Warranty
The Architecture of Computer Hardware, Systems Software, & Networking An Information Technology Approach 4th ed Smart Card Handbook, 4th Edition
Oreilly – Building the Perfect PC, 3rd Edition
The Book of Overclocking: Tweak Your PC to Unleash Its Power
Encyclopedia of Electronic Components Volume 1
Hard Disks Basics (2005) Collaborative PDF/Book
Computer repair with diagnostic flowcharts
Resistor values

Electronics for Dummies
Basic Engineering Circuit Analysis 10th Edition
The Intel Microprocessors (8th Edition) By Barry B. Brey Digital Logic And Computer Design – Morris Mano Microprocessor 8085
Into electronics
Electronic application
PIC Microcontrollers: 50 Projects for Beginners & Experts Getting Started with Raspberry Pi
Raspberry Pi: A Quick-Start Guide
Neuromorphic and Brain-Based Robots 2011

DataBase Administration:

OCA: Oracle Database 12c Administrator Certified Associate Study Guide A step-by-step guide to buildning databases, 2nd edition

System Hacks/Administration:

VMware Cookbook, Second Edition: A Real-World Guide to Effective VMware Use
RHCSA/RHCE Study Materials
CompTIA A+ Certification All-in-One Exam Guide, 8th Edition(Exams 220-801 & 220) Part 1, Part 2 ColdFusion 8 Reference

Unix/Linux/BSD:

UNIX TOOLBOX 2008 [Unix/Linux/BSD Commands] Linux in a Nutshell 6th Edition
How Linux Works What Every Superuser Should Know Several Books on the GNU/Linux Kernel.

Post Exploitation! Windows Linux/BSD/Unix
Linux Bible 2008 edition
Linux Bible 2010 edition
A Practical Guide to Linux Commands, Editors, and Shell Programming (2nd Edition) Linux From Scratch

Linux Kernel Development
UNIX and Linux System Administration Handbook, 4th Edition
The Linux Command Line: A Complete Introduction
Linux Bible 2010 Edition
Linux Networking Clearly Explained.
Understanding the Linux Kernel, Third Edition
BSD UNIX Toolbox – 1000+ Commands for FreeBSD, OpenBSD and NetBSD Power Users FreeBSD Command Reference
Working With Unix Processes
Unix In A Nutshell
Linux 101 Hacks, 2nd Edition
Ubuntu: Powerful Hacks and Customizations

The Arch Handbook
The Official Slackware Book (Slack Book)

Windows/Hacks/Administration:

MCITP Exam 70-646 Windows Server 2008 Administration eBook Windows Sysinternals Administrator’s Reference
Microsoft Windows Scripting Self-Paced Learning Guide Programming Windows – 6th Edition

Showstopper! the Breakneck Race to Create Windows NT Windows Internals Part 1
Windows Internals, Part 2
Windows Command Line Administration

Configuring Windows Server 2008 Active Directory
Microsoft System Center 2012 Endpoint Protection Cookbook

Power Shell:

Learn Windows PowerShell 3 in a Month of Lunches
Windows PowerShell 3.0 Step by Step
Mastering PowerShell
Can anyone please provide “powershell toolmaking in a month of lunches” ebook .. MSDOS primer

Mobile Hacks/Development:

Essentials Of Mobile Design (2012) – 6.6 MB Mobile Design Patterns (2012) – 4.0 MB
4G LTE LTE-Advanced for Mobile Broadband

Android:

Advanced Android 4 Games
XDA Developers’ Android Hacker’s Toolkit
Learn Java for Android Development, 2nd edition
Android Forensics
Android Programming: The Big Nerd Ranch Guide
Designing For Android (2012) – 7.3 MB
Head First – Android Development [Part 1] >> [Part 2]
Decompiling Android
Android Apps Security
OReilly: Learning Android (2011)
Android Application Development: Programming with the Google SDK Application Security for the Android Platform
Android Apps for Absolute Beginners – 2nd Edition 2012
Reversing APK files

Android Apps with Eclipse
Hello Android,3rd Edition
Android Security: Attacks and Defenses
Android Hacker’s Handbook
In-Appstore Freedom Index – Freedom Compatibility List

IOS:

Unity iOS Game Development Beginners Guide Unity iOS Essentials
iOS 7 Programming Fundamentals
iOS 7 Programming Cookbook [Part 1] >> [Part 2] iOS Hacker’s Handbook

Designing For iPhone (2012) – 9.5 MB
iPhone App Entrepreneur (2010) – 12.1 MB
Mobile Design For iPhone And iPad (2010) – 16.1 MB Head First – iPhone Development

Graphics/Web Design/Development:

How to Be a Rockstar WordPress Designer 2 + Source (2011) – 3.7 MB
Mastering WordPress – Advance Techniques (2011) – 4.4 MB Professional Web Design (2010) – 2.3 MB

Professional Web Design Vol.2 (2011) – 18.8 MB Psychology Of Web Design (2012) – 11.1 MB Responsive Design (2012) – 6.4 MB
Rockstar WordPress Designer (2010) – 22.6 MB User Experience Design (2012) – 4.8 MB

Web Design Confidential (2012) – 20.1 MB
Wordpress Essentials – Techniques For Beginners (2011) – 3.7 MB Web design in a Nutshell 3rd Edition
Client Centric Web Design – 41.5 MB [Part 1] [Part 2]
Digging Into WordPress 3.3.1 + Source (2012) – 26.0 MB
Getting To Know SEO (2012) – 817 KB
Head First – WordPress
Building WordPress Themes From Scratch (2012) – 7.2 MB

How To Write Great Copy For The Web (2010) – 6.8 MB
Theme Tumblr Like a Pro + Source (2010) – 9.5 MB
Instant Firebug Starter
Web Application Architecture: Principles, Protocols and Practices, 2nd edition

Photoshop:

Mastering Photoshop For Web Design (2010) – 10.0 MB
Mastering Photoshop for Web Design Vol – 2 (2011) – 12.7 MB
From Photoshop To HTML + Source (2010) – 30.7 MB [Part 1] [Part 2] Worth 1000 Photoshop Tricks
Blender:
The Complete Guide to Blender Graphics
Apress Beginning Blender

Science:

The Analysis of Biological Data Nuclear Matters Handbook Foundations of modern cosmology Science-Fiction Library

Evil Genius books
Elementary Differential Equations 10th Ed Building Scientific Apparatus
Richard Dawkins – The God Delusion
Forrest Mims
Sonic WarfaSound, Affect and the Ecology of Fear Dialogue concerning the Two chief world systems

Math:

Introduction to Mathematical Thinking by Keith Devlin
Request: Introduction to Mathematical Thinking by Keith Devlin
Fermat’s Enigma: The Epic Quest to Solve the World’s Greatest Mathematical Problem by Simon Singh How to Study as a Mathematics Major – Lara Alcock
Concrete Mathematics: A Foundation for Computer Science (2nd Edition)
Introduction to Mathematical Thinking by Keith Devlin
(Request) How to Study as a Mathematics Major By Lara Alcock
Mathematics for Multimedia – Mladen Victor Wickerhauser

Bissness/Finance:

High Probability Trading Strategies – Miner, Robert C How to Make a Living Trading Foriegn Exchange

Making Money in Forex Trade Like a Pro Without Giving Up Your Day Jo The 200 Best Home Businesses: Easy To Start, Fun To Run, Highly Profitable How To Build A Successful Blog Business (2010) – 7.9 MB
How To Create Selling eCommerce Websites (2010) – 16.1 MB
Rockstar Business – 1.2 MB
Successful Facebook Marketing (2011) – 6.6 MB
Twitter Up Your Business (2009) – 3.3 MB
Building Websites For Return On Investment – 16.1 MB
Get Going With Google AdWords (2011) – 5.1 MB

Freelancing:

Finance For Freelancer (2012) – 2.3 MB Freelance Confidential (2011) – 7.1 MB
How To Be A Rockstar Freelancer (2007) – 834 KB Successful Freelancing (2010) – 4.0 MB
The Freelance Statistics Report (2008) – 1.2 MB The Unlimited Freelancer (2009) – 1.1 MB

Self Improvement:

The Healthy Programmer
How to Win Every Argument The Use and Abuse of Logic
7 Weeks to 50 Pull-Ups: Strengthen and Sculpt
How to Instantly Connect with Anyone – 96 All-New Little
Never Be Lied to Again: How to Get the Truth…
The 4-Hour Body – An Uncommon Guide to Rapid Fat-Loss
How to Cheat at Everything
Healthy Lifestyle: Vital Living to 120!
Thomas Paine’s Common Sense
Mastermind: How to Think Like Sherlock Holmes
Think Fast! Accurate Decision-Making, Problem-Solving, and Planning in Minutes.. Nine Things Successful People Do Differently
[The KLF] The Manual: How to Have a Number One the Easy Way
Fast and slow thinking
The presentation secrets of Steve Jobs
Lucid Dreaming – Stephan LaBerge
You Can Win
Mindfucking A Critique of Mental Manipulation by Colin McGinn
How to hide anything
What the Schools Teach and Might Teach by John Franklin Bobbitt
Youth Its Education, Regimen, and Hygiene by G Stanley Hall
The First 20 Hours: How to Learn Anything …Fast!

Black Op and Psy-Op Tactics for Getting Women
Steal Like an Artist (And 9 Things Nobody Ever Told Me
Becoming The Ice Man
Vagabonding: An Uncommon Guide to the Art of Long-Term World Travel The Mind and Its Education by George Herbert Betts
Techniques of a Professional Pickpocketing
[Tradecraft] A Tradecraft Primer – By The CIA
What every BODY is saying

Combat:

[Tradecraft]Thwarting Enemies At Home And Abroad
The Trapping and Destruction of Executive Armored Cars
Ragnar’s Guide To Home and Recreational Use of High Explosives
Home Workshop Explosives
Fighting in the Streets: A Manual of Urban Guerrilla Warfare
Army handgun and pistol training guide
The Art of War – Sun Tzu
Championship Fighting: Explosive Punching and Aggressive Defense by Jack Dempsey Psychological Operations in Guerrilla Warfare
802.11ac A Survival Guide
AR15 A2 Rifle Diagram
Krav maga, hand to hand combat
CIA Human Resource Exploitation Manual
The State of the Art in Intrusion Prevention and Detection

Other subjects:

TutsPlus Premium eBooks Collection (2012 Updated!) The Alchemist by Paulo Coelho and other books by him Paulo Coelho (13 Books)
The Roman EmpiRoots of Imperialism

Bypassing Censorship
Bored of the rings by Harvard lampoon and Henry Beard
Carlos Castaneda
Anarchy Cookbook 2000
Halo Collection – All Books
The Lord of Rings -complete- plus movie screen plays and bonus! 8 General Education ebooks EPUB
The Immortals of Meluha
the deliberate dumbing down of america
Dr. Montessori’s Own Handbook by Maria Montessori
The Teaching of History by E. C. Hartwell
The Gale Encyclopedia of the Unusual and Unexplained
The Count of Monte Cristo
Head First – Excel
Head First – Statistics
Head First – Rails
Capitalism and Freedom

Hunger Games Trilogy
French books
DMT – The Spirit Molecule (Book)
German For Dummies, 2nd Ed.
Culture Jam: How to Reverse America’s Suicidal Consumer Binge The Rise of the Fourth Reich
inferno-dan brown
LinkedIn and Lovin it (2011) – 6.8 MB
Derren Brown eBook collection
The Tao of Badass + Bonus
A.Hitler – Mein Kampf – (My Struggle)
The Infant System by Samuel Wilderspin
Anne Rice-The Vampire Chronicles 1-10
Bobcat Presents… Joint Rolling!
Frogs into Princess
Roger Zelazny -Collection(over 60 books!)
H. Bidstrup caricature book
A Catalogue of Play Equipment by Jean Lee graph
Gödel, Escher, Bach: An Eternal Golden Braid