Bibliography

Aho, 1990
Aho, A. (1990).
Compiladores Principios, técnicas y herramientas.
Addison Wesley.

Aho et al., 2008
Aho, A., Lam, M., Sethi, R., and Ullman, J. D. (2008).
Compiladores. Principios, técnicas y herramientas.
Addison Wesley, 2nd edition.
ISBN:10-970-26-1133-4.

A.Lemone, 1996
A.Lemone, K. (1996).
Fundamentos de Compiladores.
CECSA-Mexico.

Alonso and Henríquez, 1957
Alonso, A. and Henríquez, P. (1957).
Gramática Castellana.
Losada, Buenos Aires.

Alonso and Finn, 1995
Alonso, M. and Finn, E. (1995).
Física.
Addison Wesley Iberoamericana.

Ambriola, 2001
Ambriola, V. (2001).
Software Process Technology.
Springer.

Appel, 2002
Appel, A. W. (2002).
Modern compiler implementation in Java.
Cambridge University Press, 2.a edición edition.

Apóstol, 1973
Apóstol, T. M. (1973).
Calculus, volume II.
Editorial Reverté.

Arís et al., 2003
Arís, E. P., González, J. L. S., and Rubio, F. M. (2003).
Lógica Computacional.
Thomson.

Baecker et al., 2000
Baecker, R., Buxton, W., and Grudin, J. (2000).
Readings in Human-Computer Interaction: Toward the Year 2000.
The Morgan Kaufmann Series in Interactive Technologies. Morgan Kaufmann, 2nd edition edition.

Bartle, 1976
Bartle, R. G. (1976).
The Elements of Real Analysis.
Wiley; 2 edition.

Bellovin, 1989
Bellovin, S. (1989).
Security problems in the tcp/ip protocol suite.
ACM Computer Communications Review, 19(2):32-48.

Bernedo, 1995
Bernedo, J. (1995).
Metodología Intelectual, Antología.
UCSM.

Bernstein and Newcomer, 1997
Bernstein, P. A. and Newcomer, E. (1997).
Principles of Transaction Processing, First Edition.
Morgan Kaufmann.

Blank and Dorf, 2012
Blank, S. and Dorf, B. (2012).
The Startup Owner's Manual: The Step-By-Step Guide for Building a Great Company.
K and S Ranch.

Blum, 1992
Blum, B. I. (1992).
Software Engineering: A Holistic View.
Oxford University Press US, 7th edition.

Borneianu, 2008
Borneianu, R. H. L. J. P. C. C. (2008).
A Survey of Computational Physics: Introductory Computational Science.
Princeton University Press.
978-0691131375.

Brassard and Bratley, 1997
Brassard, G. and Bratley, P. (1997).
Fundamentos de Algoritmia.
Prentice Hall.

Bratko, 1991
Bratko, I. (1991).
Prolog. Programming for artificial intelligence.
Addison Wesley.

Brey, 2005
Brey, B. B. (2005).
The Intel Microprocessors: 8086/8088, 80186, 80286, 80386, 80486, Pentium, Pentium Pro, and Pentium II, Pentium III, Pentium 4.
Prentice-Hall, 7th edition.

Brookshear, 1993
Brookshear, J. G. (1993).
Teoría de la Computación.
Addison Wesley Iberoamericana.

Brookshear, 2005
Brookshear, J. G. (2005).
Computer Science an Overview.
Addison-Wesley, 8 edition.

Brookshear, 2012
Brookshear, J. G. (2012).
Computer Science: An Overview.
Addison-Wesley, 11th edition.
ISBN 10: 0-13-256903-5.

Brusilovsky et al., 1998
Brusilovsky, P., Kobsa, A., and Vassileva, J. (1998).
Adaptive Hypertext and Hypermedia, First Edition.
Springer.

Burleson, 2004
Burleson, D. K. (2004).
Physical Database Design Using Oracle.
CRC Press.

Buzan, 1987
Buzan, T. (1987).
Cómo utilizar su mente con el máximo de rendimiento.
Ed. Planeta, Argentina.

Byers et al., 2010
Byers, T., Dorf, R., and Nelson, A. (2010).
Technology Ventures: From Idea to Enterprise.
McGraw-Hill Science.

Caballero, 1996
Caballero, P. (1996).
Introducción a la Criptografia, volume Textos Universitarios.
Ra-Ma.

Cano, 1998
Cano, J. J. (1998).
Pautas y recomendaciones para elaborar políticas de seguridad informática.
Technical report, Universidad de Los Andes.

Carrazco,
Carrazco, J. B.
Cómo aprender mejor.

Cassany and Luna, 2005
Cassany, D. and Luna, M. (2005).
Enseñar Lengua.
10a Edición.GRAÓ, ESPAÑA.

Celko, 2005
Celko, J. (2005).
Joe Celko's SQL Programming Style.
Elsevier.

Chandra et al., 2000
Chandra, R., Menon, R., Leo Dagum, D. K., Maydan, D., and McDonald, J. (2000).
Parallel Programming in OpenMP.
Morgan Kaufmann, 1 edition.

Chaupin, 1986
Chaupin, J. C. (1986).
Gramática descriptiva y funcional de la Lengua.
Ed, Montegraf, Madrid.

Chávez, 2011
Chávez, A. (2011).
Apuntes y Notas Técnicas.
UCSP.

Cisneros, 1967
Cisneros, J. (1967).
Lengua y Enseñanza.
Librería Studium, Lima.

Clote and Backofen, 2000
Clote, P. and Backofen, R. (2000).
Computational Molecular Biology, An Introduction.
Wiley.

Congreso de la Republica del Perú, 1996
Congreso de la Republica del Perú (1996).
Decreto Legislativo Nº823. Ley de la Propiedad Industrial.
El Peruano.

Conradi, 2000
Conradi, R. (2000).
Software Process Technology.
Springer.

Cormen et al., 2009
Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C. (2009).
Introduction to Algorithms.
MIT Press, third edition edition.
ISBN: 978-0-262-53305-8.

Date, 2005
Date, C. (2005).
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition.
Elsevier.

David Kincaid, 1994
David Kincaid, W. C. (1994).
Análisis Numérico.
Addison Wesley Iberoamericana.

de la Republica del Peru, 1997
de la Republica del Peru, C. (1997).
Ley Nº26887. Ley General de Sociedades.
El Peruano.

De Saussure, 1945
De Saussure, F. (1945).
Cuso de Lingüística General.
Losada, Buenos Aires.

Deitel, 2013
Deitel, H. M. (2013).
C++ How to Program.
Pearson Educacion, 9th edition.

Department of Defense, 1985
Department of Defense (1985).
Password Management Guideline (Green Book).
Department of Defense.
CSC-STD-002-85.

Devore, 1998
Devore, J. L. (1998).
Probabilidad y estadística para ingeniería y ciencias.
International Thomson Editores.

Dietrich, 2001
Dietrich, S. W. (2001).
Understanding Relational Database Query Languages, First Edition.
Prentice Hall.

Ediciones, 2005a
Ediciones, D., editor (2005a).
Financial Times Mastering Information Management.

Ediciones, 2005b
Ediciones, D., editor (2005b).
Revista Datamation MC Ediciones.

Ediciones, 2005c
Ediciones, D., editor (2005c).
Understanding the Digital Economy.

Elmasri and Navathe, 2004
Elmasri, R. and Navathe, S. B. (2004).
Fundamentals of Database Systems, Fourth Edition.
Addison Wesley.

Fager et al., 2014
Fager, J., Yépez, W. L. P., Villacrés, M., Martinez, L. A. P., Ochoa, D., and Cuadros-Vargas, E. (2014).
Estructura de datos.
Iniciativa Latinoamericana de Libros de Texto Abiertos (LATIn), first edition edition.

Fernández and Sáez, 2003
Fernández, G. and Sáez, F. (2003).
Fundamentos de Informática: Lógica, Autómatas y Lenguajes.
Anaya Multimedia.

FIPS PUB, 1994
FIPS PUB (1994).
Guideline for the analysis of local area network security.
Technical Report 191, FIPS PUB.

Foley and van Dam, 1990
Foley, J. and van Dam, A. (1990).
Computer Graphics: Principles and Practice.
Addison-Wesley.

Frank Adelstein, 2005
Frank Adelstein, Sandeep KS Gupta, G. R. I. L. S. (2005).
Fundamentals of Mobile and Pervasive Computing.
1st edition.

Fúster et al., 1997
Fúster, A., De la Guía, D., Hernández, L., Montoya, F., and Muñoz, J. (1997).
Técnicas Criptográficas de Protección de Datos.
Ra-Ma.

GARAYCOCHEA,
GARAYCOCHEA, W.
Metodología del estudio.

Garzozi-Pincay et al., 2014
Garzozi-Pincay, R., Messina-Scolaro, M., Moncada-Marino, C., Ochoa-Luna, J., Ilabel-Pérez, G., and Zambrano-Segura, R. (2014).
Planes de Negocios para Emprendedores.
Iniciativa Latinoamericana de Libros de Texto Abiertos (LATIn).

Gersting, 1987
Gersting, J. (1987).
Fundamentos Matemáticos para a Ciência da Computação.
ABDR.

Gonzales and Woods, 2007
Gonzales, R. C. and Woods, R. E. (2007).
Digital Image Processing.
Prentice Hall, 3rd edition edition.
ISBN: 013168728X,978013168728B.

Gould, 2006
Gould, H. (2006).
An Introduction to Computer Simulation Methods: Applications to Physical Systems.
Addison Wesley, 3rd edition edition.
978-0805377583.

Grassmann and Tremblay, 1997
Grassmann, W. and Tremblay, J. (1997).
Matemática Discreta y Lógica.
Prentice Hall.

Greenlaw and Hepp, 1998
Greenlaw, R. and Hepp, E. (1998).
In-line/On-line: Fundamentals of the Internet and World Wide Web.
McGraw-Hill Companies.

Grimaldi, 1997
Grimaldi, R. (1997).
Matemáticas Discretas y Combinatoria.
Addison Wesley Iberoamericana.

Grossman, 1996
Grossman, S. I. (1996).
Álgebra Lineal.
McGraw Hill.

Guardini, 1992
Guardini, R. (1992).
La Aceptación de Sí Mismo, Las Edades de la Vida.
Lumen, Buenos Aires.

Guttag and Horning, 1991
Guttag, J. V. and Horning, J. J. (1991).
A tutorial on Larch and LCL, a Larch/C interface language.
In Prehn, S. and Toetenel, W. J., editors, VDM91: Formal Software Development Methods, Delft. Springer-Verlag Lecture Notes in Computer Science 551.

Haecker, 1947
Haecker, T. (1947).
¿Qué es el Hombre?
Guadarrama.

Han and Kamber, 2001
Han, J. and Kamber, M. (2001).
Data Mining: Concepts and Techniques.
Morgan Kaufmann Publishers.

Harrington, 2002
Harrington, J. L. (2002).
Relational Database Design Clearly Explained, Second Edition.
Morgan Kaufmann.

Hearn and Baker, 1994
Hearn, D. and Baker, M. P. (1994).
Computer Graphics in C.
Prentice Hall.

Hesselbein, 1999
Hesselbein, F. (1999).
Leading Beyond the Walls.
Jossey Bass Publishers.
The Drucker Foundation.

Hinchey and Dean, 1996
Hinchey, M. and Dean, C. N. (1996).
Teaching and Learning Formal Methods.
Morgan Kaufmann.

Hockett, 1971
Hockett, C. (1971).
Curso de Lingüística Moderna.
Universitaria de Buenos Aires.

Hopcroft and Ullman, 1993
Hopcroft, J. E. and Ullman, J. D. (1993).
Introducción a la Teoría de Autómatas, Lenguajes y Computación.
CECSA.

Hugh D. Young, 2007
Hugh D. Young, Roger A. Freedman, L. F. (2007).
University Physics with Modern Physics.
Addison Wesley.

ICSA Inc., 1998
ICSA Inc. (1998).
An introduction to intrusion detection and assessment.
Technical report, ICSA Inc.

Inmon, 2004
Inmon, W. H. (2004).
Building the Data Warehouse, 3rd Edition.
Willey.

Iranzo, 2005
Iranzo, P. J. (2005).
Lógica simbólica para informáticos.
Rama.

J., 2005
J., P. P. (2005).
Constructivismo, Estrategias para aprender a aprender.
PEARSON EDUCACION.

Jacky, 1996
Jacky, J. (1996).
The Way of Z: Practical Programming with Formal Methods.
Cambridge University Press.

Johnsonbaugh, 1999
Johnsonbaugh, R. (1999).
Matemáticas Discretas.
Prentice Hall, México.

Jones and Pevzner, 2004
Jones, N. A. and Pevzner, P. A. (2004).
An Introduction to Bioinformatics Algorithms.
The MIT Press.

Jr., 1992
Jr., J. W. B. (1992).
Formal specification of engineering analysis programs.
In Houstis, E. N., Rice, J. R., and Vichnevetsky, R., editors, Expert Systems for Numerical Computing. North-Holland.

Jr, 2000
Jr, R. M. (2000).
Sistemas de Información Gerencial.
Prentice Hall, 6ta edition.

Karniadakis and II, 2003
Karniadakis, G. E. and II, R. M. K. (2003).
Parallel Scientific Computing in C++ and MPI: A Seamless Approach to Parallel Algorithms and their Implementation.
Cambridge University Press, 1 edition.

Kelley, 1995
Kelley, D. (1995).
Teoría de Autómatas y Lenguajes Formales.
Prentice Hall.

Keyes, 2004
Keyes, J. (2004).
Software Configuration Management.
CRC Press.

Kimball et al., 2005
Kimball, R., Reeves, L., Ross, M., and Thornthwaite, W. (2005).
The Data Warehouse Lifecycle Toolkit : Expert Methods for Designing, Developing, and Deploying Data Warehouses.
Willey.

Kimball and Ross, 2004
Kimball, R. and Ross, M. (2004).
The Data Warehouse Toolkit: The Complete Guide to Dimensional Modeling, Second Edition.
Willey.

Klir and A.Folger, 1995
Klir, J. G. and A.Folger, T. (1995).
Fuzzy sets, uncertainty and information.
Prentice-Hall.

Kolman, 1997
Kolman, Busby, R. (1997).
Estructuras de Matemáticas Discretas para la Computación.
Prentice Hall.

Krumm, 2009
Krumm, J. (2009).
Ubiquitous Computing Fundamentals.
Chapman & Hall/CRC, 1st edition.

Landau et al., 2007
Landau, R. H., Páez, M. J., and Bordeianu, C. C. (2007).
Computational Physics: Problem Solving with Computers.
Wiley-VCH, 2nd edition.
978-3527406265.

Larman, 2008
Larman, C. (2008).
Applying UML and Patterns.
Prentice Hall.

Laudon and Laudon, 2004
Laudon, K. C. and Laudon, J. P. (2004).
Sistemas de Información Gerencial.
Prentice Hall, 8va edition.

Leahey and Harris, 1998
Leahey, A. and Harris, J. (1998).
Aprendizaje y Metacognición.
Pretice Hall, España.

Lehmann, 2003
Lehmann, C. H. (2003).
Geometría Analítica.
Editorial Limusa.

Lin and Snyder, 2008
Lin, C. and Snyder, L. (2008).
Principles of Parallel Programming.
Addison Wesley, 1 edition.

Llopis, 2006
Llopis, N. (2006).
C++ For Game Programmers.
Charles River Media, 2 edition edition.

Lloyd, 1993
Lloyd, J. W. (1993).
Foundations of Logic Programming.
Springer.

Long, 1991
Long, F. (1991).
Software Engineering Environments.
Peter Norton Foundation Series. Springer.

Louden, 2004a
Louden, K. C. (2004a).
Construccion de Compiladores Principios y Practica.
Thomson.

Louden, 2004b
Louden, K. C. (2004b).
Lenguajes de Programacion.
Thomson.

Mano, 1992
Mano, M. M. (1992).
Computer System Architecture.
Prentice Hall, 3rd edition.

Mateu, 1999
Mateu, L. (1999).
Apuntes de Sistemas Operativos.
Universidad de Chile.

Mermin, 2006
Mermin, N. D. (2006).
Solving PDEs in C++.
SIAM, Society for Industrial and Applied Mathematics, 1 edition edition.
978-0898716016.

Meyer, 1970
Meyer, P. L. (1970).
Introductory Probability and Statistical Applications.
Addison Wesley.

Micha, 1998
Micha, E. (1998).
Matemáticas Discretas.
Limusa.

Montangero, 1996
Montangero, C. (1996).
Software Process Technology.
Springer.

Mount, 2001
Mount, D. W. (2001).
Bioinformatics: Sequence and Genome Analysis.
Cold Spring Harbor Laboratory Press.

Nakariakov, 2013
Nakariakov, S. (2013).
The Boost C++ Libraries: Generic Programming.
CreateSpace Independent Publishing Platform.

NCSC, 1987
NCSC (1987).
A guide to understanding discretionary access control in trusted systems.
Technical report, National Computer Security Center.
NCSC-TG-003.

Neuman and Ts'o, 1994
Neuman, B. C. and Ts'o, T. (1994).
Kerberos: An autentication service for computer networks.
IEEE Communications Magazine, 32(9):33-38.

Nichols et al., 1996
Nichols, B., Buttlar, D., and Farrell, J. P. (1996).
Pthreads Programming: A POSIX Standard for Better Multiprocessing.
O'Reilly Media, Inc., 1 edition.

Norton, 1988
Norton, P. (1988).
Peter Norton's Assembly Language Book for the IBM PC.
Peter Norton Foundation Series. Brady Publishing.
0136624537.

of Computer Engineering, 1995
of Computer Engineering, D. (1995).
A structured approach to computer security.
Technical report, Chalmers University of Tecnology.

Oppel, 2004
Oppel, A. (2004).
Databases Demystified.
Mc Graw Hill Osborne.

Oquendo, 2003
Oquendo, F. (2003).
Software Process Technology.
Springer.

Osterwalder and Pigneur, 2010
Osterwalder, A. and Pigneur, Y. (2010).
Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers.
Wiley.

Ozsu and Valduriez, 1999
Ozsu, M. T. and Valduriez, P. (1999).
Principles of Distributed Database Systems, Second Edition.
Prentice Hall.

Pang, 2006
Pang, T. (2006).
An Introduction to Computational Physics.
Cambridge University Press, 2nd edition.
978-0521825696.

para el Desarrollo UCSP, 2006
para el Desarrollo UCSP, C. L. (2006).
Liderazgo.
Universidad Católica San Pablo.

Pauk, 2002
Pauk, W. (2002).
Estrategias de estudio.
PEARSON EDUCACION.

Penton, 2002
Penton, R. (2002).
Data Structures for Game Programmers.
Muska & Lipman/Premier-Trade, 1st edition.
Premier Press Game Development.

Pitoura and Samaras, 1997
Pitoura, E. and Samaras, G. (1997).
Data Management for Mobile Computing.
Kluwer Academic Publishers, Norwell, MA, USA.

Pratt and V.Zelkowitz, 1998
Pratt, T. W. and V.Zelkowitz, M. (1998).
Lenguajes de Programacion Diseño e Implementacion.
Prentice-Hall Hispanoamericana S.A.

Pressman, 2004
Pressman, R. S. (2004).
Software Engineering: A Practitioner's Approach.
McGraw-Hill, 6th edition.

Pressman, 2005
Pressman, R. S. (2005).
Software Engineering: A Practitioner's Approach.
McGraw-Hill, 6th edition.

Priest and Sanchez, 2001
Priest, J. W. and Sanchez, J. M. (2001).
Product Development and Design for Manufacturing.
Marcel Dekker.

Ramió Aguirre, 1999
Ramió Aguirre, J. (1999).
Aplicaciones Criptográficas.
Dpto. de Publicaciones EUI-UPM, segunda edición edition.

Raymond A. Serway, 2009
Raymond A. Serway, J. W. J. (2009).
Physics for Scientists and Engineers.
Brooks Cole.

Reinders, 2007
Reinders, J. (2007).
Intel Threading Building Blocks: Outfitting C++ for Multi-core Processor Parallelism.
O'Reilly Media, Inc., 1 edition.

Richard L. Burden, 2002
Richard L. Burden, J. D. F. (2002).
Análisis Numérico.
Thomson Learning.

Rieger., 2002
Rieger., A. K. H. H. (2002).
Optimization Algorithms in Physics.
Wiley-VCH, 1 edition edition.
978-3527403073.

Ries, 2011
Ries, E. (2011).
The Lean Startup: How Today's Entrepreneurs Use Continuous Innovation to Create Radically Successful Businesses.
Crown Business.

Rob and Coronel, 2004
Rob, P. and Coronel, C. (2004).
Database Systems: Design, Implementation and Management, Sixth Edition.
Morgan Kaufmann.

Rosen, 2004
Rosen, K. H. (2004).
Matemática Discreta y sus Aplicaciones.
McGraw Hill.

Rosenfeld and Morville, 1998
Rosenfeld, L. and Morville, P. (1998).
Information Architecture for the World Wide Web.
O'Reilly, 1st ed edition.

Russel and Gangemi, 1991
Russel, D. and Gangemi, G. (1991).
Computer Security Basics.
O'Reilly and Associates.

Sandhu and Samarati, 1994
Sandhu, R. S. and Samarati, P. (1994).
Authentication, access control and intrusion detection.
IEEE Communications, 32(9).

Schach, 2004
Schach, S. R. (2004).
Object-Oriented and Classical Software Engineering.
McGraw-Hill.

Scheinerman, 2001
Scheinerman, E. R. (2001).
Introducción a la Teoría de Autómatas, Lenguajes y Computación.
Thomson Learning.

Schwarz., 1998
Schwarz., N. G. A. D. S. (1998).
Physics for computer science students.
Springer, 2nd edition.
978-0387949031.

Seberry and Pieprzyk, 1989
Seberry, J. and Pieprzyk, J. (1989).
Cryptography. An Introduction to Computer Security.
Prentice-Hall.

Shabana, 2008
Shabana, A. A. (2008).
Computational Continuum Mechanics.
Cambridge University Press, 1 edition edition.
978-0521885690.

Sherrod, 2007
Sherrod, A. (2007).
Data Structures and Algorithms for Game Developers.
Charles River Media, 1 edition edition.

Siegwart and Nourbakhsh, 2004
Siegwart, R. and Nourbakhsh, I. (2004).
Introduction to Autonomous Mobile Robots.
Intelligent Robots and Autonomous Agents. The MIT Press.
ISBN:0-262-19502-X.

Simmons, 1995
Simmons, G. F. (1995).
Calculus With Analytic Geometry.
McGraw-Hill Science/Engineering.

Simsion and Witt, 2004
Simsion, G. and Witt, G. (2004).
Data Modeling Essentials, Third Edition.
Morgan Kaufmann.

Smith, 2001
Smith, J. A. (2001).
Desarrollo de Proyectos con Programación Orientada a Objetos con C++.
Thomson Learning.

Sommerville, 2008
Sommerville, I. (2008).
Software Engineering.
Addison Wesley, 7th edition.
ISBN: 0321210263.

Sonka et al., 2007
Sonka, M., Hlavac, V., and Boile, R. (2007).
Image Processing, Analysis and Machine Vision.
Cengage-Engineering.

Spafford, 1998
Spafford, E. H. (1998).
The internet worm program: An analysis.
Technical report, Purdue.
CSD-TR-823.

Stallings, 1999
Stallings, W. (1999).
Cryptography and Network Security. Principles and Practice.
Prentice Hall International Editions, segunda edición edition.

Stallings, 2005
Stallings, W. (2005).
Operating Systems: Internals and Design Principles, 5/E.
Prentice Hall.

Steven C. Chapra, 1988
Steven C. Chapra, R. P. C. (1988).
Métodos Numéricos para Ingenieros McGraw.
MacGraw Hill.

Strang, 2003
Strang, G. (2003).
Introduction to Linear Algebra.
Wellesley, MA: Wellesley-Cambridge Press, 3rd edition.

Stroustrup, 2013
Stroustrup, B. (2013).
The C++ Programming Language.
Addison-Wesley, 4th edition.

Tan et al., 2005
Tan, P.-N., Steinbach, M., and Kumar, V. (2005).
Introduction to Data Mining, First Edition.
Addison Wesley.

Tanenbaum, 2001
Tanenbaum, A. S. (2001).
Modern Operating Systems, 2/E.
Prentice Hall.

Tanenbaum, 2006
Tanenbaum, A. S. (2006).
Operating Systems Design and Implementation, 3/E.
Prentice Hall.

Tapia, 2001
Tapia, A. (2001).
Educación y Desarrollo Humano.
UCSM.

Teufel and Schmidt, 1998
Teufel, B. and Schmidt, S. (1998).
Fundamentos de Compiladores.
Addison Wesley Iberoamericana.

Thijssen, 1999
Thijssen, J. M. (1999).
Computational Physics.
Cambridge University Press.
978-0521575881.

Thrun et al., 2005
Thrun, S., Burgard, W., and Fox, D. (2005).
Probabilistic Robotics.
Intelligent Robots and Autonomous Agents. The MIT Press.

Tinto, 1989
Tinto, M. (1989).
Computer viruses: prevention, detection and treatment.
Technical Report 001, National Computer Security Center.

Velazco, 1999
Velazco, M. F. (1999).
Mapas conceptuales en el aula.
Ed. San Marcos.

Venerma, 1998
Venerma, W. (1998).
Tcpwrapper: networking monitoring, access control and booby traps.
Technical report, Mathematics and Computing Science, Eindhoven University of Technology.

Veryard, 1994
Veryard, R. (1994).
Information Coordination: The Management of Information Models, Systems and Organizations.
Prentice Hall.

Wang and King, 2000
Wang, Y. and King, G. (2000).
Software Engineering Processes: Principles and Applications.
CRC Press.

Whitehorn and Marklyn, 2001
Whitehorn, M. and Marklyn, B. (2001).
Inside Relational Databases, Second Edition.
Springer.

William, 1995
William, S. (1995).
Network and Internetwork Security, Principles and Practice.
Prentice-Hall.

William Mendenhall, 1997
William Mendenhall, T. S. (1997).
Probabilidad y Estadística para Ingenerías Ciencias.
Prentice Hall Hispanoamericano, S.A.

Windle and Abreo, 2002
Windle, D. R. and Abreo, L. R. (2002).
Software Requirements Using the Unified Process.
Prentice Hall.

Witten and Bainbridge, 2002
Witten, I. H. and Bainbridge, D. (2002).
How to Build a Digital Library, First Edition.
Morgan Kaufmann.

Witten and Frank, 2005
Witten, I. H. and Frank, E. (2005).
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition.
Elsevier.

Zill, 2002
Zill, D. G. (2002).
Ecuaciones Diferenciales con Problemas de Valores en la Frontera.
Thomson Learning.


Generado por Ernesto Cuadros-Vargas , Sociedad Peruana de Computación-Peru, Universidad Católica San Pablo, Arequipa-Peru
basado en el modelo de la Computing Curricula de IEEE-CS/ACM