General Information-Security Beginner Book

Basics of Networking

Binary Exploitation

Cryptography

Web Exploitation

Important: For each category, solve previous CTF problems as many as possible.

The original list is maintained here