Bibliografía

ISO, 2013
(2013).
Iso/iec 27002:2013 information technology – security techniques – code of practice for information security controls.
Acquisti et al., 2015
Acquisti, A., Brandimarte, L., and Loewenstein, G. (2015).
Privacy and human behavior in the age of information.
In Science, volume 347, pages 509–514. American Association for the Advancement of Science.
Aho et al., 2011
Aho, A., Lam, M., Sethi, R., and Ullman, J. D. (2011).
Compilers Principles Techniques And Tools.
Pearson, 2nd edition.
ISBN:10-970-26-1133-4.
Alberts and Hayes, 2014
Alberts, C. S. and Hayes, R. E. (2014).
Strategic Cybersecurity: A Multi-layered Approach.
CRC Press.
Alexandre., 2009
Alexandre., D.-H. (2009).
Perfil del Líder. Hacia un Liderazgo Virtuoso.
Ediciones Urano S.A.
Alfred., 2010
Alfred., S. (2010).
Liderazgo Ético. La Sabiduría de decidir bien.
Ediciones Encuentro S.A Madrid y Nueva Revista de Madrid.
Alsuwaiyel, 1999
Alsuwaiyel, H. (1999).
Algorithms: Design Techniques and Analysis.
World Scientific.
Ambriola, 2001
Ambriola, V. (2001).
Software Process Technology.
Springer.
Anderson, 2020
Anderson, R. J. (2020).
Security Engineering: A Guide to Building Dependable Distributed Systems.
Wiley.
Anderson and Dahlin, 2014
Anderson, T. and Dahlin, M. (2014).
Operating Systems: Principles and Practice.
Recursive Books, 2nd edition.
Annuzzi et al., 2013
Annuzzi, J., Darcey, L., and Conder, S. (2013).
Introduction to Android Application Development: Android Essentials.
Developer's Library. Pearson Education.
Appel, 2002
Appel, A. W. (2002).
Modern compiler implementation in Java.
Cambridge University Press, 2.a edición edition.
Apóstol, 1973
Apóstol, T. M. (1973).
Calculus Vol II.
Editorial Reverté.
Argandoña, 2006
Argandoña (2006).
La identidad cristiana del directivo de empresa.
IESE.
Association for Computing Machinery, 2008
Association for Computing Machinery (2008).
Digital Libray.
Association for Computing Machinery.
http://portal.acm.org/dl.cfm.
Aumasson, 2017
Aumasson, J.-P. (2017).
Serious Cryptography: A Practical Introduction to Modern Encryption.
No Starch Press.
Avi Silberschatz, 2012
Avi Silberschatz, Peter Baer Galvin, G. G. (2012).
Operating System Concepts, 9/E.
John Wiley & Sons, Inc.
Aziz et al., 2012
Aziz, A., Lee, T., and Prakash, A. (2012).
Elements of Programming Interviews: The Insiders' Guide.
ElementsOfProgrammingInterviews.com.
Bishop, 2002
Bishop, M. (2002).
Computer Security: Art and Science.
Addison-Wesley Professional.
Blum, 1992
Blum, B. I. (1992).
Software Engineering: A Holistic View.
Oxford University Press US, 7th edition.
Boneh and Shoup, 2020
Boneh, D. and Shoup, V. (2020).
Cryptography i.
https://crypto.stanford.edu/~dabo/cryptobook/BonehShoup_0_4.pdf.
Brenner, 2007
Brenner, J. F. (2007).
Cyberthreats: The Emerging Fault Lines of the Nation State.
Oxford University Press.
Brookshear, 1993
Brookshear, J. G. (1993).
Teoría de la Computación.
Addison Wesley Iberoamericana.
Brookshear and Brylow, 2019
Brookshear, J. G. and Brylow, D. (2019).
Computer Science: An Overview.
Pearson, global edition edition.
Burbano, 2006
Burbano, S. (2006).
Física General.
Alfaomega.
Burleson, 2004
Burleson, D. K. (2004).
Physical Database Design Using Oracle.
CRC Press.
Buxton, 2007
Buxton, B. (2007).
Sketching User Experiences: Getting the Design Right and the Right Design.
Morgan Kaufmann Publishers Inc.
Buyya et al., 2013
Buyya, R., Vecchiola, C., and Selvi, S. T. (2013).
Mastering Cloud Computing: Foundations and Applications Programming.
Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1st edition.
Cantú-Paz, 2000
Cantú-Paz, E. (2000).
Efficient and Accurate Parallel Genetic Algorithms.
Kluwer Academic Publishers, Norwell, MA, USA.
Cardona and García Lombardi, 2002
Cardona, P. and García Lombardi, P. (2002).
Cómo desarrollar las Competencias de Liderazgo.
PAD Lima- Perú, Tercera Edición.
Cardona and Peña,
Cardona, P. and Peña, C. R.
Dirección por misiones: Cómo generar empresas de alto rendimiento.
Celko, 2005
Celko, J. (2005).
Joe Celko's SQL Programming Style.
Elsevier.
Chayapathi, 2016
Chayapathi, Rajendra; Syed F. Hassan; Shah, P. (2016).
Network Functions Virtualization (NFV) with a Touch of SDN.
Addison-Wesley Professional; 1 edition.
Chávez, 2011
Chávez, A. (2011).
Se necesita un tutor.
UCSP.
CiteSeer.IST, 2008
CiteSeer.IST (2008).
Scientific Literature Digital Libray.
College of Information Sciences and Technology, Penn State University.
http://citeseer.ist.psu.edu.
C.J, 2011
C.J, D. (2011).
SQL and Relational Theory: How to Write Accurate SQL Code.
O'Reilly Media.
Coello, 2007
Coello, C. A. C. (2007).
Evolutionary Algorithms for Solving Multi-Objective Problems (Genetic and Evolutionary Computation).
Springer, 2nd edition edition.
Conradi, 2000
Conradi, R. (2000).
Software Process Technology.
Springer.
Cormen et al., 2009
Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C. (2009).
Introduction to Algorithms.
MIT Press.
Coulouris et al., 2011a
Coulouris, G., Dollimore, J., Kindberg, T., and Blair, G. (2011a).
Distributed Systems: Concepts and Design.
Addison-Wesley.
Coulouris et al., 2011b
Coulouris, G., Dollimore, J., Kindberg, T., and Blair, G. (2011b).
Distributed Systems: Concepts and Design.
Addison-Wesley Publishing Company, USA, 5th edition.
Cuadros-Vargas et al., 2004
Cuadros-Vargas, E., Romero, R. A. F., Mock, M., and Brisaboa, N. (2004).
Implementing data structures: An incremental approach.
http://socios.spc.org .pe/ecuadros/cursos/pdfs/.
D' Souza,
D' Souza, S. A.
Descubre tu Liderazgo.
Editorial Sal Terrae.
da Cruz, 2007
da Cruz, A. A. (2007).
Algoritmos Evolutivos com Inspiração Quântica para Problemas com Representação Numérica.
PhD thesis, Departamento de Engenharia Elétrica, Pontifícia Universidade Católica do Rio de Janeiro, Rio de Janeiro, Brasil.
(In Portuguese).
da Cruz, 2003
da Cruz, A. V. A. (2003).
Otimização de planejamento com restriçōes de precedência usando algoritmos genéticos e co-evolução cooperativa.
Master's thesis, Departamento de Engenharia Elétrica, Pontifícia Universidade Católica do Rio de Janeiro.
Dasgupta et al., 2006
Dasgupta, S., Papadimitriou, C., and Vazirani, U. (2006).
Algorithms.
McGraw-Hill Education.
De Castro, 2006
De Castro, L. (2006).
Fundamentals of natural computing: basic concepts, algorithms, and applications.
CRC Press.
de la Lengua Española, 2010
de la Lengua Española, R. A. (2010).
Nueva gramática de la lengua española, morfología y sintaxis.
Madrid, España: Ed. Espasa.
Deitel, 2017
Deitel, D. . (2017).
C++17- The Complete Guide.
Pearson, 10th edition.
Dietrich, 2001
Dietrich, S. W. (2001).
Understanding Relational Database Query Languages, First Edition.
Prentice Hall.
Dix et al., 2004
Dix, A., Finlay, J., Abowd, G., and Beale, R. (2004).
Human-computer Interaction.
Prentice-Hall, Inc, 3 ed. edition.
Dongarra, 2006
Dongarra, J. (2006).
Trends in high performance computing: a historical overview and examination of future developments.
Circuits and Devices Magazine, IEEE, 22(1):22–27.
Dustin et al., 2008
Dustin, E., Garrett, T., and Gauf, B. (2008).
Automated Software Testing: Introduction, Management, and Performance.
Addison-Wesley Professional.
Easttom, 2015
Easttom, C. (2015).
Computer Crime, Investigation, and the Law.
Jones & Bartlett Learning.
Ediciones, 2009a
Ediciones, D., editor (2009a).
Revista Datamation MC Ediciones.
Ediciones, 2009b
Ediciones, D., editor (2009b).
Understanding the Digital Economy.
Ediciones, 2010
Ediciones, D., editor (2010).
Financial Times Mastering Information Management.
El-Mihoub et al., 2006
El-Mihoub, T. A., Hopgood, A. A., Nolle, L., and Battersby, A. (2006).
Hybrid genetic algorithms: A review.
Engineering Letters, 13(2).
Emil Eifrem and Robinson, 2015
Emil Eifrem, J. W. and Robinson, I. (2015).
Graph Databases.
O'Reilly Media, 2nd edition.
Epp, 2010
Epp, S. S. (2010).
Discrete Mathematics with Applications.
4 ed. edition.
Fager et al., 2014
Fager, J., Yépez, W. L. P., Villacrés, M., Martinez, L. A. P., Ochoa, D., and Cuadros-Vargas, E. (2014).
Estructura de datos.
Iniciativa Latinoamericana de Libros de Texto Abiertos (LATIN), first edition edition.
Fogel, 1995
Fogel, D. B. (1995).
Evolutionary Computation. Toward a New Philosophy of Machine Intelligence.
The Institute of Electrical and Electronic Engineers, New York.
for Computing Machinery (ACM), 1992
for Computing Machinery (ACM), A. (1992).
Acm code of ethics and professional conduct.
Gamma et al., 1994
Gamma, E., Helm, R., Johnson, R., and Vlissides, J. M. (1994).
Design Patterns: Elements of Reusable Object-Oriented Software.
Computing Series. Addison-Wesley Professional.
ISBN-10: 0201633612.
Ginebra and Serrabou, 2010
Ginebra, G. and Serrabou, G. G. (2010).
Gestión de incompetentes. Libros de Cabecera.
Goldberg, 1989
Goldberg, D. E. (1989).
Genetic Algorithms in Search, Optimization and Machine Learning.
Addison-Wesley Publishing Co., Reading, Massachusetts.
Goleman, 2012
Goleman, D. (2012).
Inteligencia emocional.
Editorial Kairós.
Gollmann, 2010
Gollmann, D. (2010).
Computer Security.
Wiley.
Goodrich and Tamassia, 2009
Goodrich, M. T. and Tamassia, R. (2009).
Algorithm Design: Foundations, Analysis and Internet Examples.
John Wiley & Sons, Inc., 2nd edition.
Graeme Simsion, 2004
Graeme Simsion, G. W. (2004).
Data Modeling Essentials, Third Edition.
Morgan Kaufmann.
Grimaldi, 1997
Grimaldi, R. (1997).
Matemáticas Discretas y Combinatoria.
Addison Wesley Iberoamericana.
Grimaldi, 2003
Grimaldi, R. (2003).
Discrete and Combinatorial Mathematics: An Applied Introduction.
Pearson, 5 ed. edition.
Grove, 2009
Grove, R. (2009).
Web Based Application Development.
Jones & Bartlett Learning.
Halim, 2013
Halim, S. (2013).
Competitive Programming.
Lulu, 3 rd edition.
Hawkins, 2012
Hawkins, P. (2012).
Coaching y liderazgo de equipos: coaching para un liderazgo con capacidad de transformación.
Ediciones Granica.
Haykin, 1999
Haykin, S. (1999).
Neural networks: A Comprehensive Foundation.
Prentice Hall.
Hearn and Baker, 1990
Hearn, D. and Baker, P. (1990).
Computer Graphics in C.
Prentice Hall.
Hennessy and Patterson, 2006
Hennessy, J. L. and Patterson, D. A. (2006).
Computer Architecture: A Quantitative Approach.
Morgan Kaufman, San Mateo, CA, 4th edition.
Hernández, 2006
Hernández, A. (2006).
Ética Actual y Profesional. Lecturas para la Convivencia Global en el Siglo XXI.
Ed. Thomson.
Hersey et al., 1998
Hersey, P., Blanchard, K. H., and Johnson, D. E. (1998).
Administración del comportamiento organizacional: liderazgo situacional.
Hirsh and Smale, 1974
Hirsh, M. W. and Smale, S. (1974).
Differential Equatons, Dynamical Systems, and Linear Álgebra.
Academia Press.
Holland, 1975
Holland, J. H. (1975).
Adaptation in Natural and Artificial Systems.
University of Michigan Press, Ann Arbor, Michigan, first edition.
Hopcroft and Ullman, 2008
Hopcroft, J. E. and Ullman, J. D. (2008).
Introducción a la Teoría de Autómatas, Lenguajes y Computación.
Pearson Educacion.
Hughes et al., 2013
Hughes, J. F., Dam, A. V., Mcguire, M., Sklar, D. F., Foley, J. D., Feiner, S. K., and Akeley, K. (2013).
Computer Graphics - Principles and Practice 3rd Edition.
Addison-Wesley.
Humble and Farley, 2010
Humble, J. and Farley, D. (2010).
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation.
Addison-Wesley Professional.
Hunsaker, 2010
Hunsaker, P. (2010).
El nuevo arte de gestionar equipos: Un enfoque actual para guiar y motivar con éxito.
Hwang et al., 2011
Hwang, K., Dongarra, J., and Fox, G. C. (2011).
Distributed and Cloud Computing: From Parallel Processing to the Internet of Things.
Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1st edition.
IEEE, 2004
IEEE (2004).
Ieee code of ethics.
IEE.
IEEE-Computer Society, 2008
IEEE-Computer Society (2008).
Digital Libray.
IEEE-Computer Society.
http://www.computer.org/publications/dlib.
ión, 2014
ión, R. L. (2014).
Calculus.
10th edition.
Johnson, 2010
Johnson, J. (2010).
Designing with the Mind in Mind: Simple Guide to Understanding User Interface Design Rules.
Morgan Kaufmann Publishers Inc., 3 ed. edition.
Johnson, 1991
Johnson, M. (1991).
Superscalar microprocessor design.
Prentice Hall series in innovative technology. Prentice Hall.
Johnsonbaugh, 1999
Johnsonbaugh, R. (1999).
Matemáticas Discretas.
Prentice Hall, México.
Jr, 2000
Jr, R. M. (2000).
Sistemas de Información Gerencial.
Prentice Hall.
Kadushin, 2011
Kadushin, C. (2011).
Understanding Social Networks: Theories, Concepts, And Findings.
Oxford University Press, Usa; 1 edition.
Katz and Lindell, 2014
Katz, J. and Lindell, Y. (2014).
Introduction to Modern Cryptography.
CRC press.
Kelley, 1995
Kelley, D. (1995).
Teoría de Autómatas y Lenguajes Formales.
Prentice Hall.
Keyes, 2004
Keyes, J. (2004).
Software Configuration Management.
CRC Press.
Kirk and mei W. Hwu, 2013
Kirk, D. B. and mei W. Hwu, W. (2013).
Programming Massively Parallel Processors: A Hands-on Approach.
Morgan Kaufmann, 2nd edition.
Kleinberg and Tardos, 2005
Kleinberg, J. and Tardos, E. (2005).
Algorithm Design.
Addison-Wesley Longman Publishing Co., Inc.
Knapp and Brenner, 2012
Knapp, E. M. and Brenner, J. (2012).
Cybersecurity and Global Security: Threats and Mitigation.
Springer.
Knuth, 1997a
Knuth, D. (1997a).
The Art of Computer Programming: Fundamental algorithms Vol 1.
Addison-Wesley, third edition edition.
Knuth, 1997b
Knuth, D. E. (1997b).
The Art of Computer Programming, Vol. 1: Fundamental Algorithms.
Addison-Wesley Professional, 3rd edition.
Knuth, 1998
Knuth, D. E. (1998).
The art of computer programming, volume 3:Sorting and searching.
Addison-Wesley Professional, 2nd edition.
Knuth, 2007a
Knuth, D. E. (2007a).
The Art of Computer Programming, Fundamental Algorithms, volume I.
Addison-Wesley, 3rd edition.
0-201-89683-4.
Knuth, 2007b
Knuth, D. E. (2007b).
The Art of Computer Programming, Sorting and Searching, volume II.
Addison-Wesley, 2nd edition.
0-201-89685-0.
Koller and Friedman, 2009
Koller, D. and Friedman, N. (2009).
Probabilistic Graphical Models: Principles and Techniques - Adaptive Computation and Machine Learning.
The MIT Press.
Korth and Silberschatz, 2002
Korth, H. F. and Silberschatz, A. (2002).
Fundamentos de Base de Datos.
McGraw-Hill.
Koza, 1992
Koza, J. R. (1992).
Genetic Programming. On the Programming of Computers by Means of Natural Selection.
The MIT Press, Cambridge, Massachusetts.
Kulikov, 2019
Kulikov, A. S. (2019).
Learning Algorithms Through Programming and Puzzle Solving.
Active Learning Technologies.
Kurose and Ross, 2013
Kurose, J. and Ross, K. (2013).
Computer Networking: A Top-down Approach.
Always learning. Pearson, 7th edition.
Kurose and Ross, 2016
Kurose, J. F. and Ross, K. W. (2016).
Computer Networking: A Top-Down Approach.
Pearson.
Laaksonen, 2017
Laaksonen, A. (2017).
Guide to Competitive Programming: Learning and Improving Algorithms Through Contests.
Stringer.
Larman, 2008
Larman, C. (2008).
Applying UML and Patterns.
Prentice Hall.
Laudon and Laudon, 2004
Laudon, K. C. and Laudon, J. P. (2004).
Sistemas de Información Gerencial.
Prentice Hall.
Laudon and Laudon, 2017
Laudon, K. C. and Laudon, J. P. (2017).
Management Information Systems: Managing the Digital Firm.
Pearson, 15th edition.
Leavitt and Shneiderman, 2006
Leavitt, M. and Shneiderman, B. (2006).
Research-Based Web Design & Usability Guidelines.
Health and Human Services Dept.
Louden, 2004a
Louden, K. C. (2004a).
Compiler Construction: Principles and Practice.
Thomson.
Louden, 2004b
Louden, K. C. (2004b).
Lenguajes de Programacion.
Thomson.
Loza, 2000
Loza, C. (2000).
El aporte de la doctrina social de la iglesia a la toma de decisiones empresariales.
Separata ofrecida por el profesor.
Luis., 2008
Luis., H. (2008).
Construye tu Sueño.
LID Editorial Empresarial.
M. Tamer Ozsu, 1999
M. Tamer Ozsu, P. V. (1999).
Principles of Distributed Database Systems, Second Edition.
Prentice Hall.
Majorana, 1958
Majorana, A. (1958).
El arte de hablar en publico.
La España Moderna.
Manuel., 2009
Manuel., F. P. (2009).
Gobierno de Personas en la Empresa.
Ediciones Universidad de Navarra EUNSA.
Manzone, 2007
Manzone, G. (2007).
La Responsabilidad de la Empresa, Business Ethics y Doctrina Social de la Iglesia en Diálogo.
Universidad Católica San Pablo.
Mark Whitehorn, 2001
Mark Whitehorn, B. M. (2001).
Inside Relational Databases, Second Edition.
Springer.
Marschner and Shirley, 2016
Marschner, S. and Shirley, P. (2016).
Fundamentals of Computer Graphics.
CRC Press, fourth edition edition.
Maruja., 2007
Maruja., C. N. (2007).
Dueños de Nuestro Destino.
Editorial Ariel.
Mathis, 2011
Mathis, L. (2011).
Designed for Use: Create Usable Interfaces for Applications and the Web.
Pragmatic Bookshelf.
Matloff, 2014
Matloff, N. (2014).
Programming on Parallel Machines.
University of California, Davis.
McGraw, 2006
McGraw, G. (2006).
Software Security: Building Security In.
Addison-Wesley Professional.
Mendenhall, 2014
Mendenhall, B. (2014).
Introducción a la probabilidad y estadística.
Cengage Learning, 13th edition.
Micha, 1998
Micha, E. (1998).
Matemáticas Discretas.
Limusa.
Michalewicz, 1996
Michalewicz, Z. (1996).
Genetic Algorithms + Data Structures = Evolution Programs.
Springer-Verlag.
Michalewicz, 2000
Michalewicz, Z. (2000).
Introduction to constraint-handling tecniques, decoders, repair algorithms, constraint-preserving operators.
Evolutionary Computation 2, Advanced Algorithms and Operators, pages 38–40,49–55,56–61,62–68.
Miguel A. Revilla, 2003
Miguel A. Revilla, S. S. (2003).
Programming Challenges: The Programming Contest Training Manual.
Springer.
Mitchell, 1998
Mitchell, M. (1998).
An introduction to genetic algorithms.
The MIT press.
Mitchell, 2004
Mitchell, M. (2004).
An Introduction to Genetic Algorithms: Complex Adaptative Systems.
The MIT Press.
Mitnick and Simon, 2002
Mitnick, K. D. and Simon, W. L. (2002).
The Art of Deception: Controlling the Human Element of Security.
Wiley.
Monroe and Ehninger, 1976
Monroe, A. and Ehninger, D. (1976).
La comunicación oral.
Hispano Europea.
Montangero, 1996
Montangero, C. (1996).
Software Process Technology.
Springer.
M.Ross, 2014
M.Ross, S. (2014).
Introduction to Probability and Statistics for Engineers and Scientists.
Academic Press, 5th edition.
Murphy, 2012
Murphy, K. P. (2012).
Machine Learning: A Probabilistic Perspective.
The MIT Press.
Nakariakov, 2013
Nakariakov, S. (2013).
The Boost C++ Libraries: Generic Programming.
CreateSpace Independent Publishing Platforml.
National Institute of Standards and Technology, 2003
National Institute of Standards and Technology (2003).
Building an information technology security awareness and training program.
Technical Report NIST Special Publication 800-50, National Institute of Standards and Technology.
National Institute of Standards and Technology, 2008
National Institute of Standards and Technology (2008).
Guide to general server security.
Technical Report NIST Special Publication 800-123, National Institute of Standards and Technology.
National Institute of Standards and Technology, 2011
National Institute of Standards and Technology (2011).
Information security continuous monitoring (iscm) for federal information systems and organizations.
Technical Report NIST Special Publication 800-137, National Institute of Standards and Technology.
National Institute of Standards and Technology, 2012a
National Institute of Standards and Technology (2012a).
Computer security incident handling guide.
NIST Special Publication NIST Special Publication 800-61 Rev. 2, National Institute of Standards and Technology.
National Institute of Standards and Technology, 2012b
National Institute of Standards and Technology (2012b).
Guide for conducting risk assessments.
NIST Special Publication NIST Special Publication 800-30 Rev. 1, National Institute of Standards and Technology.
National Institute of Standards and Technology, 2014
National Institute of Standards and Technology (2014).
Guidelines for media sanitization.
NIST Special Publication NIST Special Publication 800-88 Rev. 1, National Institute of Standards and Technology.
National Institute of Standards and Technology, 2016
National Institute of Standards and Technology (2016).
Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems.
Number 800-160 Vol. 1 in NIST Special Publication.
National Institute of Standards and Technology, 2017a
National Institute of Standards and Technology (2017a).
Digital identity guidelines.
NIST Special Publication NIST Special Publication 800-63-3, National Institute of Standards and Technology.
National Institute of Standards and Technology, 2017b
National Institute of Standards and Technology (2017b).
An introduction to computer security: The nist handbook.
NIST Special Publication 800-12 Rev. 1, National Institute of Standards and Technology.
Nieburh, 2003
Nieburh, R. (2003).
El Yo Responsable. Ensayo de Filosofía Moral Cristiana.
Bilbao.
Nilsson, 2001
Nilsson, N. (2001).
Inteligencia Artificial: Una nueva visión.
McGraw-Hill.
Norman, 2004
Norman, D. A. (2004).
Emotional Design: Why We Love (or Hate) Everyday Things.
Basic Book.
Olson and Turner, 2008
Olson, D. L. and Turner, S. (2008).
Enhancing user trust and awareness through usable security feedback.
In Proceedings of the 2008 Workshop on New Security Paradigms, pages 83–92.
Oquendo, 2003
Oquendo, F. (2003).
Software Process Technology.
Springer.
Pacheco, 2011
Pacheco, P. S. (2011).
An Introduction to Parallel Programming.
Morgan Kaufmann, 1st edition.
para las Comunicaciones Sociales, 2002
para las Comunicaciones Sociales, P. C. (2002).
Ética en Internet.
Parhami, 2002
Parhami, B. (2002).
Introduction to parallel processing: algorithms and architectures.
Plenum series in computer science. Plenum Press.
Parhami, 2005
Parhami, B. (2005).
Computer Architecture: From Microprocessors to Supercomputers.
Oxford Univ. Press, New York.
Patterson and Hennessy, 2014
Patterson, D. A. and Hennessy, J. L. (2014).
Computer Organization and Design: The Hardware/Software Interface.
Morgan Kaufman, San Mateo, CA, 5 edition.
Pavis, 1998
Pavis, P. (1998).
Diccionario del Teatro.
Edit. Piados BA.
Perez, 2010
Perez, A. (2010).
Teoría del Derecho.
Editorial Madrid.
Peter Brusilovsky, 1998
Peter Brusilovsky, Alfred Kobsa, J. V. (1998).
Adaptive Hypertext and Hypermedia, First Edition.
Springer.
Peter Rob, 2004
Peter Rob, C. C. (2004).
Database Systems: Design, Implementation and Management, Sixth Edition.
Morgan Kaufmann.
Peterson and Davie, 2011
Peterson, L. L. and Davie, B. S. (2011).
Computer Networks: A Systems Approach.
Morgan Kaufmann.
Pfleeger and Pfleeger, 2006
Pfleeger, C. P. and Pfleeger, S. L. (2006).
Security in Computing.
Prentice Hall.
PGregory Shakhnarovich and Indyk, 2006
PGregory Shakhnarovich, T. D. and Indyk, P. (2006).
Nearest-Neighbor Methods in Learning and Vision: Theory and Practice.
MIT Press, 1st edition.
ISBN 0-262-19547-X.
Philip A. Bernstein, 1997
Philip A. Bernstein, E. N. (1997).
Principles of Transaction Processing, First Edition.
Morgan Kaufmann.
Ponce-Gallegos et al., 2014
Ponce-Gallegos, J., Torres-Soto, A., tima Quezada Aguilera, Silva-Sprock, A., Flor, E. M., Casali, A., Scheihing, E., Tupac, Y., Soto, M. T., Zapata, F. O., A., J. H., D., C. Z., Vakhnia, N., and Pedreño, O. (2014).
Inteligencia Artificial.
Iniciativa Latinoamericana de Libros de Texto Abiertos (LATIn).
Pressman, 2004
Pressman, R. S. (2004).
Software Engineering: A Practitioner's Approach.
McGraw-Hill, 6th edition.
Pressman, 2005
Pressman, R. S. (2005).
Software Engineering: A Practitioner's Approach.
McGraw-Hill, 6th edition.
Pressman and Maxim, 2015
Pressman, R. S. and Maxim, B. (2015).
Software Engineering: A Practitioner's Approach.
McGraw-Hill, 8th edition.
Priest and Sanchez, 2001
Priest, J. W. and Sanchez, J. M. (2001).
Product Development and Design for Manufacturing.
Marcel Dekker.
Pérez López, 1998
Pérez López, J. A. (1998).
Liderazgo y Ética en la Dirección de Empresas.
Bilbao.
Quinn, 2003
Quinn, M. J. (2003).
Parallel Programming in C with MPI and OpenMP.
McGraw-Hill Education Group, 1st edition.
Quintana, 2007
Quintana, V. (2007).
El estudio Universitario y elementos de investigación científica.
Editorial universitaria.
Ramakrishnan and Gehrke, 2003
Ramakrishnan, R. and Gehrke, J. (2003).
Database Management Systems.
McGraw-Hill, 3rd edition.
Ramez Elmasri, 2004
Ramez Elmasri, S. B. N. (2004).
Fundamentals of Database Systems, Fourth Edition.
Addison Wesley.
Rawlins, 1992
Rawlins, G. (1992).
Compared to What?: An Introduction to the Analysis of Algorithms.
Computer Science Press.
Reese, 2013
Reese, M. (2013).
Understanding and Using C Pointers.
Inc.
Resnik, 2007
Resnik, R. y Halliday, D. (2007).
Física, volume 1.
Patria, 5th edition.
Reynolds, 1994
Reynolds, R. G. (1994).
An Introduction to Cultural Algorithms.
In Sebald, A. V., , and Fogel, L. J., editors, Proceedings of the Third Annual Conference on Evolutionary Programming, pages 131–139. World Scientific, River Edge, New Jersey.
Rivest and Stein, 2009
Rivest, T. H. C. C. E. L. . R. L. and Stein, C. (2009).
Introduction to Algorithms, Third Edition.
The MIT Press, 3rd edition.
Rodríguez,
Rodríguez, M. L.
Cómo manejar la información en una presentación.
Rogers and Sharp, 2011
Rogers, Y. and Sharp, H. & Preece, J. (2011).
Interaction Design: Beyond Human-Computer Interaction.
John Wiley and Sons Ltd, 3 ed. edition.
Rosen, 2007
Rosen, K. H. (2007).
Discrete Mathematics and Its Applications.
7 ed. edition.
Rozenberg et al., 2012
Rozenberg, G., Bäck, T., and Kok, J. N., editors (2012).
Handbook of Natural Computing.
Springer Publishing Company, Incorporated, 1st edition.
Russell and Norvig, 2003
Russell, S. and Norvig, P. (2003).
Inteligencia Artifical: Un enfoque moderno.
Prentice Hall.
Saltzer and Schroeder, 1975
Saltzer, J. H. and Schroeder, M. D. (1975).
The protection of information in computer systems.
Proceedings of the IEEE, 63(9):1278–1308.
Samet, 2006
Samet, H. (2006).
Foundations of Multidimensional and Metric Data Structures.
Elsevier/Morgan Kaufmann, illustrated edition.
Sanders and Kandrot, 2010
Sanders, J. and Kandrot, E. (2010).
CUDA by Example: An Introduction to General-Purpose GPU Programming.
Addison-Wesley Professional, 1st edition.
Schach, 2004
Schach, S. R. (2004).
Object-Oriented and Classical Software Engineering.
McGraw-Hill.
Scheinerman, 2012
Scheinerman, E. R. (2012).
Mathematics: A Discrete Introduction.
3 ed. edition.
Schmidt, 1995a
Schmidt, E. (1995a).
Etica y negocios par América latina.
Universidad del Pacifico Lima.
Schmidt, 1995b
Schmidt, E. (1995b).
Ética y Negocios para América Latina.
Universidad del Pacífico.
Schneier, 2015
Schneier, B. (2015).
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World.
W. W. Norton & Company.
Seacord, 2005
Seacord, R. C. (2005).
Secure Coding in C and C++.
Addison-Wesley Professional.
Sedgewick and Flajolet, 2013
Sedgewick, R. and Flajolet, P. (2013).
An Introduction to the Analysis of Algorithms.
Pearson Education.
Sedgewick and Wayne, 2011
Sedgewick, R. and Wayne, K. (2011).
Algorithms.
Pearson Education.
Serway, 2009
Serway, R. A. y Jewett, J. (2009).
Física para Ciencias e Ingeniería con Física Moderna, volume 1.
Cengage Learning, 7th edition.
Sipser, 2012
Sipser, M. (2012).
Introduction to the Theory of Computation (third edition).
Publisher: Cengage Learning.
Smith and Coit, 2000
Smith, A. E. and Coit, D. W. (2000).
Penalty functions.
Evolutionary Computation 2, Advanced Algorithms and Operators, pages 41–48.
Solove, 2006
Solove, D. J. (2006).
A taxonomy of privacy.
University of Pennsylvania Law Review, 154(3):477–564.
Sommerville, 2008
Sommerville, I. (2008).
Software Engineering.
Addison Wesley, 7th edition.
ISBN: 0321210263.
Sommerville, 2017
Sommerville, I. (2017).
Software Engineering.
Pearson, 10th edition.
Stallings, 2005
Stallings, W. (2005).
Operating Systems: Internals and Design Principles, 5/E.
Prentice Hall.
Stallings, 2018
Stallings, W. (2018).
Computer Organization and Architecture: Designing for Performance.
Pearson.
Stevens and Fall, 2011
Stevens, W. R. and Fall, K. R. (2011).
TCP/IP Illustrated, Volume 1: The Protocols.
Addison-Wesley Professional.
Stewart, 2012
Stewart, J. (2012).
Calculus.
CENGAGE Learning, 7th edition.
Stone et al., 2005
Stone, D., Jarrett, C., Woodroffe, M., and Minocha, S. (2005).
User Interface Design and Evaluation.
Morgan Kaufmann Series in Interactive Technologies.
Storn and Price, 1995
Storn, R. and Price, K. (1995).
Differential Evolution: A Simple and Efficient Adaptive Scheme for Global Optimization over Continuous Spaces.
Technical Report TR-95-012, International Computer Science Institute, Berkeley, California.
Strang, 2003
Strang, G. (2003).
Introduction to Linear Algebra, 3rd edición.
Wellesley-Cambridge Press.
Stroustrup, 2013a
Stroustrup, B. (2013a).
The C++ Programming Language.
Addison-Wesley, 4th edition.
Stroustrup, 2013b
Stroustrup, B. (2013b).
The C++ Programming Language, 4th edition.
Addison-Wesley.
Tanenbaum, 2001
Tanenbaum, A. S. (2001).
Modern Operating Systems, 4/E.
Prentice Hall.
Tanenbaum, 2006
Tanenbaum, A. S. (2006).
Operating Systems Design and Implementation, 3/E.
Prentice Hall.
Tanenbaum and Wetherall, 2010
Tanenbaum, A. S. and Wetherall, D. J. (2010).
Computer Networks.
Prentice Hall.
Tarjan, 1983
Tarjan, R. E. (1983).
Data Structures and Network Algorithms.
Society for Industrial and Applied Mathematics.
Tavani, 2011
Tavani, H. T. (2011).
Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing.
Wiley.
Teufel and Schmidt, 1998
Teufel, B. and Schmidt, S. (1998).
Fundamentos de Compiladores.
Addison Wesley Iberoamericana.
Tipler, 2009
Tipler, P. y Mosca, G. (2009).
Física para la ciencia y la tecnología, volume 1.
Reverte, 7th edition.
Toppo and Dewan, 2013
Toppo, N. and Dewan, H. (2013).
Pointers in C: A Hand on Approach.
Apress.
Velazco, 1999
Velazco, M. F. (1999).
Mapas conceptuales en el aula.
Ed. San Marcos.
W and L, 2014
W, S. and L, B. (2014).
Computer Security: Principles and Practice.
Pearson Education, Limited.
Wang and King, 2000
Wang, Y. and King, G. (2000).
Software Engineering Processes: Principles and Applications.
CRC Press.
Weise, 2009
Weise, T. (2009).
Global optimization algorithms - theory and application.
http://www.it-weise.de.
Whittaker and Thompson, 2012
Whittaker, J. A. and Thompson, H. H. (2012).
How to Break Software Security.
Addison-Wesley Professional.
Wigdor and Wixon, 2011
Wigdor, D. and Wixon, D. (2011).
Brave NUI World: Designing Natural User Interfaces for Touch and Gesture.
Morgan Kaufmann Publishers Inc.
Wilkinson., 2009
Wilkinson., C. P. H. (2009).
Creciendo como Líder.
Ediciones Universidad de Navarra S.A (EUNSA), Primera Edición.
Windle and Abreo, 2002
Windle, D. R. and Abreo, L. R. (2002).
Software Requirements Using the Unified Process.
Prentice Hall.
Yurichev, 2014
Yurichev, D. (2014).
Reverse Engineering for Beginners.
Independently published.
Zezula et al., 2007
Zezula, P., Amato, G., Dohnal, V., and Batko, M. (2007).
Similarity Search: The Metric Space Approach.
Springer, 1st edition.
ISBN-10: 0387291466.
Zill, 2002
Zill, D. G. (2002).
Ecuaciones Diferenciales con Problemas de Valores en la Frontera.
Thomson Learning.
Zill, 2013
Zill, D. G. (2013).
Differential equations with Boundary value problems.
CENGAGE Learning, 8th edition.


Generado por Ernesto Cuadros-Vargas , Sociedad Peruana de Computación-Peru, basado en el modelo de la Computing Curricula de IEEE-CS/ACM