- Bis,
-
- ISO, 2013
-
(2013).
Iso/iec 27002:2013 information technology – security techniques –
code of practice for information security controls.
- Acquisti et al., 2015
-
Acquisti, A., Brandimarte, L., and Loewenstein, G. (2015).
Privacy and human behavior in the age of information.
In Science, volume 347, pages 509–514. American Association
for the Advancement of Science.
- Aho et al., 2011
-
Aho, A., Lam, M., Sethi, R., and Ullman, J. D. (2011).
Compilers Principles Techniques And Tools.
Pearson, 2nd edition.
ISBN:10-970-26-1133-4.
- Alberts and Hayes, 2014
-
Alberts, C. S. and Hayes, R. E. (2014).
Strategic Cybersecurity: A Multi-layered Approach.
CRC Press.
- Alexandre., 2009
-
Alexandre., D.-H. (2009).
Perfil del Líder. Hacia un Liderazgo Virtuoso.
Ediciones Urano S.A.
- Alfred., 2010
-
Alfred., S. (2010).
Liderazgo Ético. La Sabiduría de decidir bien.
Ediciones Encuentro S.A Madrid y Nueva Revista de Madrid.
- Alsuwaiyel, 1999
-
Alsuwaiyel, H. (1999).
Algorithms: Design Techniques and Analysis.
World Scientific.
- Ambriola, 2001
-
Ambriola, V. (2001).
Software Process Technology.
Springer.
- Anderson, 2020
-
Anderson, R. J. (2020).
Security Engineering: A Guide to Building Dependable Distributed
Systems.
Wiley.
- Anderson and Dahlin, 2014
-
Anderson, T. and Dahlin, M. (2014).
Operating Systems: Principles and Practice.
Recursive Books, 2nd edition.
- Annuzzi et al., 2013
-
Annuzzi, J., Darcey, L., and Conder, S. (2013).
Introduction to Android Application Development: Android
Essentials.
Developer's Library. Pearson Education.
- Appel, 2002
-
Appel, A. W. (2002).
Modern compiler implementation in Java.
Cambridge University Press, 2.a edición edition.
- Apóstol, 1973
-
Apóstol, T. M. (1973).
Calculus Vol II.
Editorial Reverté.
- Argandoña, 2006
-
Argandoña (2006).
La identidad cristiana del directivo de empresa.
IESE.
- Association for Computing Machinery, 2008
-
Association for Computing Machinery (2008).
Digital Libray.
Association for Computing Machinery.
http://portal.acm.org/dl.cfm.
- Aumasson, 2017
-
Aumasson, J.-P. (2017).
Serious Cryptography: A Practical Introduction to Modern
Encryption.
No Starch Press.
- Avi Silberschatz, 2012
-
Avi Silberschatz, Peter Baer Galvin, G. G. (2012).
Operating System Concepts, 9/E.
John Wiley & Sons, Inc.
- Aziz et al., 2012
-
Aziz, A., Lee, T., and Prakash, A. (2012).
Elements of Programming Interviews: The Insiders' Guide.
ElementsOfProgrammingInterviews.com.
- Blum, 1992
-
Blum, B. I. (1992).
Software Engineering: A Holistic View.
Oxford University Press US, 7th edition.
- Boneh and Shoup, 2020
-
Boneh, D. and Shoup, V. (2020).
Cryptography i.
https://crypto.stanford.edu/~dabo/cryptobook/BonehShoup_0_4.pdf.
- Brenner, 2007
-
Brenner, J. F. (2007).
Cyberthreats: The Emerging Fault Lines of the Nation State.
Oxford University Press.
- Brookshear, 1993
-
Brookshear, J. G. (1993).
Teoría de la Computación.
Addison Wesley Iberoamericana.
- Brookshear and Brylow, 2019
-
Brookshear, J. G. and Brylow, D. (2019).
Computer Science: An Overview.
Pearson, global edition edition.
- Burbano, 2006
-
Burbano, S. (2006).
Física General.
Alfaomega.
- Burleson, 2004
-
Burleson, D. K. (2004).
Physical Database Design Using Oracle.
CRC Press.
- Buxton, 2007
-
Buxton, B. (2007).
Sketching User Experiences: Getting the Design Right and the
Right Design.
Morgan Kaufmann Publishers Inc.
- Buyya et al., 2013
-
Buyya, R., Vecchiola, C., and Selvi, S. T. (2013).
Mastering Cloud Computing: Foundations and Applications
Programming.
Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1st edition.
- Cantú-Paz, 2000
-
Cantú-Paz, E. (2000).
Efficient and Accurate Parallel Genetic Algorithms.
Kluwer Academic Publishers, Norwell, MA, USA.
- Cardona and García Lombardi, 2002
-
Cardona, P. and García Lombardi, P. (2002).
Cómo desarrollar las Competencias de Liderazgo.
PAD Lima- Perú, Tercera Edición.
- Cardona and Peña,
-
Cardona, P. and Peña, C. R.
Dirección por misiones: Cómo generar empresas de alto
rendimiento.
- Celko, 2005
-
Celko, J. (2005).
Joe Celko's SQL Programming Style.
Elsevier.
- Chayapathi, 2016
-
Chayapathi, Rajendra; Syed F. Hassan; Shah, P. (2016).
Network Functions Virtualization (NFV) with a Touch of SDN.
Addison-Wesley Professional; 1 edition.
- Chávez, 2011
-
Chávez, A. (2011).
Se necesita un tutor.
UCSP.
- CiteSeer.IST, 2008
-
CiteSeer.IST (2008).
Scientific Literature Digital Libray.
College of Information Sciences and Technology, Penn State
University.
http://citeseer.ist.psu.edu.
- C.J, 2011
-
C.J, D. (2011).
SQL and Relational Theory: How to Write Accurate SQL Code.
O'Reilly Media.
- Coello, 2007
-
Coello, C. A. C. (2007).
Evolutionary Algorithms for Solving Multi-Objective Problems
(Genetic and Evolutionary Computation).
Springer, 2nd edition edition.
- Conradi, 2000
-
Conradi, R. (2000).
Software Process Technology.
Springer.
- Cormen et al., 2009
-
Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C. (2009).
Introduction to Algorithms.
MIT Press.
- Coulouris et al., 2011a
-
Coulouris, G., Dollimore, J., Kindberg, T., and Blair, G. (2011a).
Distributed Systems: Concepts and Design.
Addison-Wesley.
- Coulouris et al., 2011b
-
Coulouris, G., Dollimore, J., Kindberg, T., and Blair, G. (2011b).
Distributed Systems: Concepts and Design.
Addison-Wesley Publishing Company, USA, 5th edition.
- Cuadros-Vargas et al., 2004
-
Cuadros-Vargas, E., Romero, R. A. F., Mock, M., and Brisaboa, N. (2004).
Implementing data structures: An incremental approach.
http://socios.spc.org .pe/ecuadros/cursos/pdfs/.
- D' Souza,
-
D' Souza, S. A.
Descubre tu Liderazgo.
Editorial Sal Terrae.
- da Cruz, 2007
-
da Cruz, A. A. (2007).
Algoritmos Evolutivos com Inspiração Quântica para
Problemas com Representação Numérica.
PhD thesis, Departamento de Engenharia Elétrica, Pontifícia
Universidade Católica do Rio de Janeiro, Rio de Janeiro, Brasil.
(In Portuguese).
- da Cruz, 2003
-
da Cruz, A. V. A. (2003).
Otimização de planejamento com restriçōes de precedência usando
algoritmos genéticos e co-evolução cooperativa.
Master's thesis, Departamento de Engenharia Elétrica, Pontifícia
Universidade Católica do Rio de Janeiro.
- Dasgupta et al., 2006
-
Dasgupta, S., Papadimitriou, C., and Vazirani, U. (2006).
Algorithms.
McGraw-Hill Education.
- De Castro, 2006
-
De Castro, L. (2006).
Fundamentals of natural computing: basic concepts, algorithms,
and applications.
CRC Press.
- de la Lengua Española, 2010
-
de la Lengua Española, R. A. (2010).
Nueva gramática de la lengua española, morfología y
sintaxis.
Madrid, España: Ed. Espasa.
- Deitel, 2017
-
Deitel, D. . (2017).
C++17- The Complete Guide.
Pearson, 10th edition.
- Dietrich, 2001
-
Dietrich, S. W. (2001).
Understanding Relational Database Query Languages, First
Edition.
Prentice Hall.
- Dix et al., 2004
-
Dix, A., Finlay, J., Abowd, G., and Beale, R. (2004).
Human-computer Interaction.
Prentice-Hall, Inc, 3 ed. edition.
- Dongarra, 2006
-
Dongarra, J. (2006).
Trends in high performance computing: a historical overview and
examination of future developments.
Circuits and Devices Magazine, IEEE, 22(1):22–27.
- Dustin et al., 2008
-
Dustin, E., Garrett, T., and Gauf, B. (2008).
Automated Software Testing: Introduction, Management, and
Performance.
Addison-Wesley Professional.
- Easttom, 2015
-
Easttom, C. (2015).
Computer Crime, Investigation, and the Law.
Jones & Bartlett Learning.
- Ediciones, 2009a
-
Ediciones, D., editor (2009a).
Revista Datamation MC Ediciones.
- Ediciones, 2009b
-
Ediciones, D., editor (2009b).
Understanding the Digital Economy.
- Ediciones, 2010
-
Ediciones, D., editor (2010).
Financial Times Mastering Information Management.
- El-Mihoub et al., 2006
-
El-Mihoub, T. A., Hopgood, A. A., Nolle, L., and Battersby, A. (2006).
Hybrid genetic algorithms: A review.
Engineering Letters, 13(2).
- Emil Eifrem and Robinson, 2015
-
Emil Eifrem, J. W. and Robinson, I. (2015).
Graph Databases.
O'Reilly Media, 2nd edition.
- Epp, 2010
-
Epp, S. S. (2010).
Discrete Mathematics with Applications.
4 ed. edition.
- Fager et al., 2014
-
Fager, J., Yépez, W. L. P., Villacrés, M., Martinez, L. A. P., Ochoa, D., and
Cuadros-Vargas, E. (2014).
Estructura de datos.
Iniciativa Latinoamericana de Libros de Texto Abiertos (LATIN), first
edition edition.
- Fogel, 1995
-
Fogel, D. B. (1995).
Evolutionary Computation. Toward a New Philosophy of Machine
Intelligence.
The Institute of Electrical and Electronic Engineers, New York.
- for Computing Machinery (ACM), 1992
-
for Computing Machinery (ACM), A. (1992).
Acm code of ethics and professional conduct.
- Gamma et al., 1994
-
Gamma, E., Helm, R., Johnson, R., and Vlissides, J. M. (1994).
Design Patterns: Elements of Reusable Object-Oriented Software.
Computing Series. Addison-Wesley Professional.
ISBN-10: 0201633612.
- Ginebra and Serrabou, 2010
-
Ginebra, G. and Serrabou, G. G. (2010).
Gestión de incompetentes. Libros de Cabecera.
- Goldberg, 1989
-
Goldberg, D. (1989).
Genetic Algorithms in Search, Optimization and Machine
Learning.
Addison Wesley.
- Goleman, 1997
-
Goleman, D. (1997).
La Inteligencia Emocional.
J Vergara editores.
- Gollmann, 2010
-
Gollmann, D. (2010).
Computer Security.
Wiley.
- Goodrich and Tamassia, 2009
-
Goodrich, M. T. and Tamassia, R. (2009).
Algorithm Design: Foundations, Analysis and Internet Examples.
John Wiley & Sons, Inc., 2nd edition.
- Graeme Simsion, 2004
-
Graeme Simsion, G. W. (2004).
Data Modeling Essentials, Third Edition.
Morgan Kaufmann.
- Grimaldi, 1997
-
Grimaldi, R. (1997).
Matemáticas Discretas y Combinatoria.
Addison Wesley Iberoamericana.
- Grimaldi, 2003
-
Grimaldi, R. (2003).
Discrete and Combinatorial Mathematics: An Applied
Introduction.
Pearson, 5 ed. edition.
- Grove, 2009
-
Grove, R. (2009).
Web Based Application Development.
Jones & Bartlett Learning.
- Halim, 2013
-
Halim, S. (2013).
Competitive Programming.
Lulu, 3 rd edition.
- Hawkins, 2012
-
Hawkins, P. (2012).
Coaching y liderazgo de equipos: coaching para un liderazgo con
capacidad de transformación.
Ediciones Granica.
- Haykin, 1999
-
Haykin, S. (1999).
Neural networks: A Comprehensive Foundation.
Prentice Hall.
- Hearn and Baker, 1990
-
Hearn, D. and Baker, P. (1990).
Computer Graphics in C.
Prentice Hall.
- Hennessy and Patterson, 2006
-
Hennessy, J. L. and Patterson, D. A. (2006).
Computer Architecture: A Quantitative Approach.
Morgan Kaufman, San Mateo, CA, 4th edition.
- Hernández, 2006
-
Hernández, A. (2006).
Ética Actual y Profesional. Lecturas para la Convivencia Global
en el Siglo XXI.
Ed. Thomson.
- Hersey et al., 1998
-
Hersey, P., Blanchard, K. H., and Johnson, D. E. (1998).
Administración del comportamiento organizacional: liderazgo
situacional.
- Hirsh and Smale, 1974
-
Hirsh, M. W. and Smale, S. (1974).
Differential Equatons, Dynamical Systems, and Linear Álgebra.
Academia Press.
- Holland, 1975
-
Holland, J. H. (1975).
Adaptation in Natural and Artificial Systems.
University of Michigan Press, Ann Arbor, Michigan, first edition.
- Hopcroft and Ullman, 2008
-
Hopcroft, J. E. and Ullman, J. D. (2008).
Introducción a la Teoría de Autómatas, Lenguajes y
Computación.
Pearson Educacion.
- Hughes et al., 2013
-
Hughes, J. F., Dam, A. V., Mcguire, M., Sklar, D. F., Foley, J. D., Feiner,
S. K., and Akeley, K. (2013).
Computer Graphics - Principles and Practice 3rd Edition.
Addison-Wesley.
- Humble and Farley, 2010
-
Humble, J. and Farley, D. (2010).
Continuous Delivery: Reliable Software Releases through Build,
Test, and Deployment Automation.
Addison-Wesley Professional.
- Hunsaker, 2010
-
Hunsaker, P. (2010).
El nuevo arte de gestionar equipos: Un enfoque actual para guiar
y motivar con éxito.
- Hwang et al., 2011
-
Hwang, K., Dongarra, J., and Fox, G. C. (2011).
Distributed and Cloud Computing: From Parallel Processing to the
Internet of Things.
Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1st edition.
- IEEE, 2004
-
IEEE (2004).
Ieee code of ethics.
IEE.
- IEEE-Computer Society, 2008
-
IEEE-Computer Society (2008).
Digital Libray.
IEEE-Computer Society.
http://www.computer.org/publications/dlib.
- ión, 2014
-
ión, R. L. (2014).
Calculus.
10th edition.
- Johnson, 2010
-
Johnson, J. (2010).
Designing with the Mind in Mind: Simple Guide to Understanding
User Interface Design Rules.
Morgan Kaufmann Publishers Inc., 3 ed. edition.
- Johnson, 1991
-
Johnson, M. (1991).
Superscalar microprocessor design.
Prentice Hall series in innovative technology. Prentice Hall.
- Johnsonbaugh, 1999
-
Johnsonbaugh, R. (1999).
Matemáticas Discretas.
Prentice Hall, México.
- Jr, 2000
-
Jr, R. M. (2000).
Sistemas de Información Gerencial.
Prentice Hall.
- Kadushin, 2011
-
Kadushin, C. (2011).
Understanding Social Networks: Theories, Concepts, And
Findings.
Oxford University Press, Usa; 1 edition.
- Katz and Lindell, 2014
-
Katz, J. and Lindell, Y. (2014).
Introduction to Modern Cryptography.
CRC press.
- Kelley, 1995
-
Kelley, D. (1995).
Teoría de Autómatas y Lenguajes Formales.
Prentice Hall.
- Keyes, 2004
-
Keyes, J. (2004).
Software Configuration Management.
CRC Press.
- Kirk and mei W. Hwu, 2013
-
Kirk, D. B. and mei W. Hwu, W. (2013).
Programming Massively Parallel Processors: A Hands-on Approach.
Morgan Kaufmann, 2nd edition.
- Kleinberg and Tardos, 2005
-
Kleinberg, J. and Tardos, E. (2005).
Algorithm Design.
Addison-Wesley Longman Publishing Co., Inc.
- Knapp and Brenner, 2012
-
Knapp, E. M. and Brenner, J. (2012).
Cybersecurity and Global Security: Threats and Mitigation.
Springer.
- Knuth, 1997a
-
Knuth, D. (1997a).
The Art of Computer Programming: Fundamental algorithms Vol 1.
Addison-Wesley, third edition edition.
- Knuth, 1997b
-
Knuth, D. E. (1997b).
The Art of Computer Programming, Vol. 1: Fundamental
Algorithms.
Addison-Wesley Professional, 3rd edition.
- Knuth, 1998
-
Knuth, D. E. (1998).
The art of computer programming, volume 3:Sorting and
searching.
Addison-Wesley Professional, 2nd edition.
- Knuth, 2007a
-
Knuth, D. E. (2007a).
The Art of Computer Programming, Fundamental Algorithms,
volume I.
Addison-Wesley, 3rd edition.
0-201-89683-4.
- Knuth, 2007b
-
Knuth, D. E. (2007b).
The Art of Computer Programming, Sorting and Searching,
volume II.
Addison-Wesley, 2nd edition.
0-201-89685-0.
- Koller and Friedman, 2009
-
Koller, D. and Friedman, N. (2009).
Probabilistic Graphical Models: Principles and Techniques -
Adaptive Computation and Machine Learning.
The MIT Press.
- Korth and Silberschatz, 2002
-
Korth, H. F. and Silberschatz, A. (2002).
Fundamentos de Base de Datos.
McGraw-Hill.
- Koza, 1992
-
Koza, J. R. (1992).
Genetic Programming. On the Programming of Computers by Means of
Natural Selection.
The MIT Press, Cambridge, Massachusetts.
- Kulikov, 2019
-
Kulikov, A. S. (2019).
Learning Algorithms Through Programming and Puzzle Solving.
Active Learning Technologies.
- Kurose and Ross, 2013
-
Kurose, J. and Ross, K. (2013).
Computer Networking: A Top-down Approach.
Always learning. Pearson, 7th edition.
- Kurose and Ross, 2016
-
Kurose, J. F. and Ross, K. W. (2016).
Computer Networking: A Top-Down Approach.
Pearson.
- Laaksonen, 2017
-
Laaksonen, A. (2017).
Guide to Competitive Programming: Learning and Improving
Algorithms Through Contests.
Stringer.
- Larman, 2008
-
Larman, C. (2008).
Applying UML and Patterns.
Prentice Hall.
- Laudon and Laudon, 2004
-
Laudon, K. C. and Laudon, J. P. (2004).
Sistemas de Información Gerencial.
Prentice Hall.
- Laudon and Laudon, 2017
-
Laudon, K. C. and Laudon, J. P. (2017).
Management Information Systems: Managing the Digital Firm.
Pearson, 15th edition.
- Leavitt and Shneiderman, 2006
-
Leavitt, M. and Shneiderman, B. (2006).
Research-Based Web Design & Usability Guidelines.
Health and Human Services Dept.
- Louden, 2004a
-
Louden, K. C. (2004a).
Compiler Construction: Principles and Practice.
Thomson.
- Louden, 2004b
-
Louden, K. C. (2004b).
Lenguajes de Programacion.
Thomson.
- Loza, 2000
-
Loza, C. (2000).
El aporte de la doctrina social de la iglesia a la toma de decisiones
empresariales.
Separata ofrecida por el profesor.
- Luis., 2008
-
Luis., H. (2008).
Construye tu Sueño.
LID Editorial Empresarial.
- M. Tamer Ozsu, 1999
-
M. Tamer Ozsu, P. V. (1999).
Principles of Distributed Database Systems, Second Edition.
Prentice Hall.
- Majorana, 1958
-
Majorana, A. (1958).
El arte de hablar en publico.
La España Moderna.
- Manuel., 2009
-
Manuel., F. P. (2009).
Gobierno de Personas en la Empresa.
Ediciones Universidad de Navarra EUNSA.
- Manzone, 2007
-
Manzone, G. (2007).
La Responsabilidad de la Empresa, Business Ethics y Doctrina
Social de la Iglesia en Diálogo.
Universidad Católica San Pablo.
- Mark Whitehorn, 2001
-
Mark Whitehorn, B. M. (2001).
Inside Relational Databases, Second Edition.
Springer.
- Marschner and Shirley, 2016
-
Marschner, S. and Shirley, P. (2016).
Fundamentals of Computer Graphics.
CRC Press, fourth edition edition.
- Maruja., 2007
-
Maruja., C. N. (2007).
Dueños de Nuestro Destino.
Editorial Ariel.
- Mathis, 2011
-
Mathis, L. (2011).
Designed for Use: Create Usable Interfaces for Applications and
the Web.
Pragmatic Bookshelf.
- Matloff, 2014
-
Matloff, N. (2014).
Programming on Parallel Machines.
University of California, Davis.
- McGraw, 2006
-
McGraw, G. (2006).
Software Security: Building Security In.
Addison-Wesley Professional.
- Mendenhall, 2014
-
Mendenhall, B. (2014).
Introducción a la probabilidad y estadística.
Cengage Learning, 13th edition.
- Micha, 1998
-
Micha, E. (1998).
Matemáticas Discretas.
Limusa.
- Michalewicz, 1996
-
Michalewicz, Z. (1996).
Genetic Algorithms + Data Structures = Evolution Programs.
Springer-Verlag.
- Michalewicz, 2000
-
Michalewicz, Z. (2000).
Introduction to constraint-handling tecniques, decoders, repair
algorithms, constraint-preserving operators.
Evolutionary Computation 2, Advanced Algorithms and Operators,
pages 38–40,49–55,56–61,62–68.
- Miguel A. Revilla, 2003
-
Miguel A. Revilla, S. S. (2003).
Programming Challenges: The Programming Contest Training
Manual.
Springer.
- Mitchell, 1998
-
Mitchell, M. (1998).
An introduction to genetic algorithms.
The MIT press.
- Mitchell, 2004
-
Mitchell, M. (2004).
An Introduction to Genetic Algorithms: Complex Adaptative
Systems.
The MIT Press.
- Mitnick and Simon, 2002
-
Mitnick, K. D. and Simon, W. L. (2002).
The Art of Deception: Controlling the Human Element of
Security.
Wiley.
- Monroe and Ehninger, 1976
-
Monroe, A. and Ehninger, D. (1976).
La comunicación, oral.
Oral Edit Hispano Europea Barcelona.
- Montangero, 1996
-
Montangero, C. (1996).
Software Process Technology.
Springer.
- M.Ross, 2014
-
M.Ross, S. (2014).
Introduction to Probability and Statistics for Engineers and
Scientists.
Academic Press, 5th edition.
- Murphy, 2012
-
Murphy, K. P. (2012).
Machine Learning: A Probabilistic Perspective.
The MIT Press.
- Nakariakov, 2013
-
Nakariakov, S. (2013).
The Boost C++ Libraries: Generic Programming.
CreateSpace Independent Publishing Platforml.
- National Institute of Standards and Technology, 2003
-
National Institute of Standards and Technology (2003).
Building an information technology security awareness and training
program.
Technical Report NIST Special Publication 800-50, National Institute
of Standards and Technology.
- National Institute of Standards and Technology,
2008
-
National Institute of Standards and Technology (2008).
Guide to general server security.
Technical Report NIST Special Publication 800-123, National Institute
of Standards and Technology.
- National Institute of Standards and Technology,
2011
-
National Institute of Standards and Technology (2011).
Information security continuous monitoring (iscm) for federal
information systems and organizations.
Technical Report NIST Special Publication 800-137, National Institute
of Standards and Technology.
- National Institute of Standards and Technology,
2012a
-
National Institute of Standards and Technology (2012a).
Computer security incident handling guide.
NIST Special Publication NIST Special Publication 800-61 Rev. 2,
National Institute of Standards and Technology.
- National Institute of Standards and Technology,
2012b
-
National Institute of Standards and Technology (2012b).
Guide for conducting risk assessments.
NIST Special Publication NIST Special Publication 800-30 Rev. 1,
National Institute of Standards and Technology.
- National Institute of Standards and Technology,
2014
-
National Institute of Standards and Technology (2014).
Guidelines for media sanitization.
NIST Special Publication NIST Special Publication 800-88 Rev. 1,
National Institute of Standards and Technology.
- National Institute of Standards and Technology,
2016
-
National Institute of Standards and Technology (2016).
Systems Security Engineering: Considerations for a
Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems.
Number 800-160 Vol. 1 in NIST Special Publication.
- National Institute of Standards and Technology,
2017a
-
National Institute of Standards and Technology (2017a).
Digital identity guidelines.
NIST Special Publication NIST Special Publication 800-63-3, National
Institute of Standards and Technology.
- National Institute of Standards and Technology,
2017b
-
National Institute of Standards and Technology (2017b).
An introduction to computer security: The nist handbook.
NIST Special Publication 800-12 Rev. 1, National Institute of
Standards and Technology.
- Nieburh, 2003
-
Nieburh, R. (2003).
El Yo Responsable. Ensayo de Filosofía Moral Cristiana.
Bilbao.
- Nilsson, 2001
-
Nilsson, N. (2001).
Inteligencia Artificial: Una nueva visión.
McGraw-Hill.
- Norman, 2004
-
Norman, D. A. (2004).
Emotional Design: Why We Love (or Hate) Everyday Things.
Basic Book.
- Olson and Turner, 2008
-
Olson, D. L. and Turner, S. (2008).
Enhancing user trust and awareness through usable security feedback.
In Proceedings of the 2008 Workshop on New Security Paradigms,
pages 83–92.
- Oquendo, 2003
-
Oquendo, F. (2003).
Software Process Technology.
Springer.
- Pacheco, 2011
-
Pacheco, P. S. (2011).
An Introduction to Parallel Programming.
Morgan Kaufmann, 1st edition.
- para las Comunicaciones Sociales, 2002
-
para las Comunicaciones Sociales, P. C. (2002).
Ética en Internet.
- Parhami, 2002
-
Parhami, B. (2002).
Introduction to parallel processing: algorithms and
architectures.
Plenum series in computer science. Plenum Press.
- Parhami, 2005
-
Parhami, B. (2005).
Computer Architecture: From Microprocessors to Supercomputers.
Oxford Univ. Press, New York.
- Patterson and Hennessy, 2014
-
Patterson, D. A. and Hennessy, J. L. (2014).
Computer Organization and Design: The Hardware/Software
Interface.
Morgan Kaufman, San Mateo, CA, 5 edition.
- Pavis, 1998
-
Pavis, P. (1998).
Diccionario del Teatro.
Edit. Piados BA.
- Perez, 2010
-
Perez, A. (2010).
Teoría del Derecho.
Editorial Madrid.
- Peter Brusilovsky, 1998
-
Peter Brusilovsky, Alfred Kobsa, J. V. (1998).
Adaptive Hypertext and Hypermedia, First Edition.
Springer.
- Peter Rob, 2004
-
Peter Rob, C. C. (2004).
Database Systems: Design, Implementation and Management, Sixth
Edition.
Morgan Kaufmann.
- Peterson and Davie, 2011
-
Peterson, L. L. and Davie, B. S. (2011).
Computer Networks: A Systems Approach.
Morgan Kaufmann.
- Pfleeger and Pfleeger, 2006
-
Pfleeger, C. P. and Pfleeger, S. L. (2006).
Security in Computing.
Prentice Hall.
- PGregory Shakhnarovich and Indyk, 2006
-
PGregory Shakhnarovich, T. D. and Indyk, P. (2006).
Nearest-Neighbor Methods in Learning and Vision: Theory and
Practice.
MIT Press, 1st edition.
ISBN 0-262-19547-X.
- Philip A. Bernstein, 1997
-
Philip A. Bernstein, E. N. (1997).
Principles of Transaction Processing, First Edition.
Morgan Kaufmann.
- Ponce-Gallegos et al., 2014
-
Ponce-Gallegos, J., Torres-Soto, A., tima Quezada Aguilera, Silva-Sprock, A.,
Flor, E. M., Casali, A., Scheihing, E., Tupac, Y., Soto, M. T., Zapata,
F. O., A., J. H., D., C. Z., Vakhnia, N., and Pedreño, O. (2014).
Inteligencia Artificial.
Iniciativa Latinoamericana de Libros de Texto Abiertos (LATIn).
- Pressman, 2004
-
Pressman, R. S. (2004).
Software Engineering: A Practitioner's Approach.
McGraw-Hill, 6th edition.
- Pressman, 2005
-
Pressman, R. S. (2005).
Software Engineering: A Practitioner's Approach.
McGraw-Hill, 6th edition.
- Pressman and Maxim, 2015
-
Pressman, R. S. and Maxim, B. (2015).
Software Engineering: A Practitioner's Approach.
McGraw-Hill, 8th edition.
- Priest and Sanchez, 2001
-
Priest, J. W. and Sanchez, J. M. (2001).
Product Development and Design for Manufacturing.
Marcel Dekker.
- Pérez López, 1998
-
Pérez López, J. A. (1998).
Liderazgo y Ética en la Dirección de Empresas.
Bilbao.
- Quinn, 2003
-
Quinn, M. J. (2003).
Parallel Programming in C with MPI and OpenMP.
McGraw-Hill Education Group, 1st edition.
- Quintana, 2007
-
Quintana, V. (2007).
El estudio Universitario y elementos de investigación
científica.
Editorial universitaria.
- Ramakrishnan and Gehrke, 2003
-
Ramakrishnan, R. and Gehrke, J. (2003).
Database Management Systems.
McGraw-Hill, 3rd edition.
- Ramez Elmasri, 2004
-
Ramez Elmasri, S. B. N. (2004).
Fundamentals of Database Systems, Fourth Edition.
Addison Wesley.
- Rawlins, 1992
-
Rawlins, G. (1992).
Compared to What?: An Introduction to the Analysis of
Algorithms.
Computer Science Press.
- Reese, 2013
-
Reese, M. (2013).
Understanding and Using C Pointers.
Inc.
- Resnik, 2007
-
Resnik, R. y Halliday, D. (2007).
Física, volume 1.
Patria, 5th edition.
- Reynolds, 1994
-
Reynolds, R. G. (1994).
An Introduction to Cultural Algorithms.
In Sebald, A. V., , and Fogel, L. J., editors, Proceedings of
the Third Annual Conference on Evolutionary Programming, pages 131–139.
World Scientific, River Edge, New Jersey.
- Rivest and Stein, 2009
-
Rivest, T. H. C. C. E. L. . R. L. and Stein, C. (2009).
Introduction to Algorithms, Third Edition.
The MIT Press, 3rd edition.
- Rodríguez, 2007
-
Rodríguez, J. (2007).
Guía para el método de estudio universitario.
Educa.
- Rogers and Sharp, 2011
-
Rogers, Y. and Sharp, H. & Preece, J. (2011).
Interaction Design: Beyond Human-Computer Interaction.
John Wiley and Sons Ltd, 3 ed. edition.
- Rosen, 2007
-
Rosen, K. H. (2007).
Discrete Mathematics and Its Applications.
7 ed. edition.
- Rozenberg et al., 2012
-
Rozenberg, G., Bäck, T., and Kok, J. N., editors (2012).
Handbook of Natural Computing.
Springer Publishing Company, Incorporated, 1st edition.
- Russell and Norvig, 2003
-
Russell, S. and Norvig, P. (2003).
Inteligencia Artifical: Un enfoque moderno.
Prentice Hall.
- Saltzer and Schroeder, 1975
-
Saltzer, J. H. and Schroeder, M. D. (1975).
The protection of information in computer systems.
Proceedings of the IEEE, 63(9):1278–1308.
- Samet, 2006
-
Samet, H. (2006).
Foundations of Multidimensional and Metric Data Structures.
Elsevier/Morgan Kaufmann, illustrated edition.
- Sanders and Kandrot, 2010
-
Sanders, J. and Kandrot, E. (2010).
CUDA by Example: An Introduction to General-Purpose GPU
Programming.
Addison-Wesley Professional, 1st edition.
- Schach, 2004
-
Schach, S. R. (2004).
Object-Oriented and Classical Software Engineering.
McGraw-Hill.
- Scheinerman, 2012
-
Scheinerman, E. R. (2012).
Mathematics: A Discrete Introduction.
3 ed. edition.
- Schmidt, 1995a
-
Schmidt, E. (1995a).
Etica y negocios par América latina.
Universidad del Pacifico Lima.
- Schmidt, 1995b
-
Schmidt, E. (1995b).
Ética y Negocios para América Latina.
Universidad del Pacífico.
- Schneier, 2015
-
Schneier, B. (2015).
Data and Goliath: The Hidden Battles to Collect Your Data and
Control Your World.
W. W. Norton & Company.
- Seacord, 2005
-
Seacord, R. C. (2005).
Secure Coding in C and C++.
Addison-Wesley Professional.
- Sedgewick and Flajolet, 2013
-
Sedgewick, R. and Flajolet, P. (2013).
An Introduction to the Analysis of Algorithms.
Pearson Education.
- Sedgewick and Wayne, 2011
-
Sedgewick, R. and Wayne, K. (2011).
Algorithms.
Pearson Education.
- Serway, 2009
-
Serway, R. A. y Jewett, J. (2009).
Física para Ciencias e Ingeniería con Física Moderna,
volume 1.
Cengage Learning, 7th edition.
- Sipser, 2012
-
Sipser, M. (2012).
Introduction to the Theory of Computation (third edition).
Publisher: Cengage Learning.
- Smith and Coit, 2000
-
Smith, A. E. and Coit, D. W. (2000).
Penalty functions.
Evolutionary Computation 2, Advanced Algorithms and Operators,
pages 41–48.
- Solove, 2006
-
Solove, D. J. (2006).
A taxonomy of privacy.
University of Pennsylvania Law Review, 154(3):477–564.
- Sommerville, 2008
-
Sommerville, I. (2008).
Software Engineering.
Addison Wesley, 7th edition.
ISBN: 0321210263.
- Sommerville, 2017
-
Sommerville, I. (2017).
Software Engineering.
Pearson, 10th edition.
- Stallings, 2005
-
Stallings, W. (2005).
Operating Systems: Internals and Design Principles, 5/E.
Prentice Hall.
- Stallings, 2018
-
Stallings, W. (2018).
Computer Organization and Architecture: Designing for
Performance.
Pearson.
- Stevens and Fall, 2011
-
Stevens, W. R. and Fall, K. R. (2011).
TCP/IP Illustrated, Volume 1: The Protocols.
Addison-Wesley Professional.
- Stewart, 2012
-
Stewart, J. (2012).
Calculus.
7th edition.
- Stone et al., 2005
-
Stone, D., Jarrett, C., Woodroffe, M., and Minocha, S. (2005).
User Interface Design and Evaluation.
Morgan Kaufmann Series in Interactive Technologies.
- Storn and Price, 1995
-
Storn, R. and Price, K. (1995).
Differential Evolution: A Simple and Efficient Adaptive
Scheme for Global Optimization over Continuous Spaces.
Technical Report TR-95-012, International Computer Science Institute,
Berkeley, California.
- Strang, 2003
-
Strang, G. (2003).
Introduction to Linear Algebra, 3rd edición.
Wellesley-Cambridge Press.
- Stroustrup, 2013a
-
Stroustrup, B. (2013a).
The C++ Programming Language.
Addison-Wesley, 4th edition.
- Stroustrup, 2013b
-
Stroustrup, B. (2013b).
The C++ Programming Language, 4th edition.
Addison-Wesley.
- Tanenbaum, 2001
-
Tanenbaum, A. S. (2001).
Modern Operating Systems, 4/E.
Prentice Hall.
- Tanenbaum, 2006
-
Tanenbaum, A. S. (2006).
Operating Systems Design and Implementation, 3/E.
Prentice Hall.
- Tanenbaum and Wetherall, 2010
-
Tanenbaum, A. S. and Wetherall, D. J. (2010).
Computer Networks.
Prentice Hall.
- Tarjan, 1983
-
Tarjan, R. E. (1983).
Data Structures and Network Algorithms.
Society for Industrial and Applied Mathematics.
- Tavani, 2011
-
Tavani, H. T. (2011).
Ethics and Technology: Controversies, Questions, and Strategies
for Ethical Computing.
Wiley.
- Teufel and Schmidt, 1998
-
Teufel, B. and Schmidt, S. (1998).
Fundamentos de Compiladores.
Addison Wesley Iberoamericana.
- Tipler, 2009
-
Tipler, P. y Mosca, G. (2009).
Física para la ciencia y la tecnología, volume 1.
Reverte, 7th edition.
- Toppo and Dewan, 2013
-
Toppo, N. and Dewan, H. (2013).
Pointers in C: A Hand on Approach.
Apress.
- Velazco, 1999
-
Velazco, M. F. (1999).
Mapas conceptuales en el aula.
Ed. San Marcos.
- W and L, 2014
-
W, S. and L, B. (2014).
Computer Security: Principles and Practice.
Pearson Education, Limited.
- Wang and King, 2000
-
Wang, Y. and King, G. (2000).
Software Engineering Processes: Principles and Applications.
CRC Press.
- Weise, 2009
-
Weise, T. (2009).
Global optimization algorithms - theory and application.
http://www.it-weise.de.
- Whittaker and Thompson, 2012
-
Whittaker, J. A. and Thompson, H. H. (2012).
How to Break Software Security.
Addison-Wesley Professional.
- Wigdor and Wixon, 2011
-
Wigdor, D. and Wixon, D. (2011).
Brave NUI World: Designing Natural User Interfaces for Touch and
Gesture.
Morgan Kaufmann Publishers Inc.
- Wilkinson., 2009
-
Wilkinson., C. P. H. (2009).
Creciendo como Líder.
Ediciones Universidad de Navarra S.A (EUNSA), Primera Edición.
- Windle and Abreo, 2002
-
Windle, D. R. and Abreo, L. R. (2002).
Software Requirements Using the Unified Process.
Prentice Hall.
- Yurichev, 2014
-
Yurichev, D. (2014).
Reverse Engineering for Beginners.
Independently published.
- Zezula et al., 2007
-
Zezula, P., Amato, G., Dohnal, V., and Batko, M. (2007).
Similarity Search: The Metric Space Approach.
Springer, 1st edition.
ISBN-10: 0387291466.
- Zill, 2002
-
Zill, D. G. (2002).
Ecuaciones Diferenciales con Problemas de Valores en la
Frontera.
Thomson Learning.
- Zill, 2013
-
Zill, D. G. (2013).
Differential equations with Boundary value problems.
CENGAGE Learning, 8th edition.
Generado por Ernesto Cuadros-Vargas , Sociedad Peruana de Computación-Peru, basado en el modelo de la Computing Curricula de IEEE-CS/ACM