- ISO, 2013
 - 
 (2013).
Iso/iec 27002:2013 information technology – security techniques –
  code of practice for information security controls.
 - Acquisti et al., 2015
 - 
Acquisti, A., Brandimarte, L., and Loewenstein, G. (2015).
Privacy and human behavior in the age of information.
In Science, volume 347, pages 509–514. American Association
  for the Advancement of Science.
 - Aho et al., 2011
 - 
Aho, A., Lam, M., Sethi, R., and Ullman, J. D. (2011).
Compilers Principles Techniques And Tools.
Pearson, 2nd edition.
ISBN:10-970-26-1133-4.
 - Alberts and Hayes, 2014
 - 
Alberts, C. S. and Hayes, R. E. (2014).
Strategic Cybersecurity: A Multi-layered Approach.
CRC Press.
 - Alexandre., 2009
 - 
Alexandre., D.-H. (2009).
Perfil del Líder. Hacia un Liderazgo Virtuoso.
Ediciones Urano S.A.
 - Alfred., 2010
 - 
Alfred., S. (2010).
Liderazgo Ético. La Sabiduría de decidir bien.
Ediciones Encuentro S.A Madrid y Nueva Revista de Madrid.
 - Alsuwaiyel, 1999
 - 
Alsuwaiyel, H. (1999).
Algorithms: Design Techniques and Analysis.
World Scientific.
 - Ambriola, 2001
 - 
Ambriola, V. (2001).
Software Process Technology.
Springer.
 - Anderson, 2020
 - 
Anderson, R. J. (2020).
Security Engineering: A Guide to Building Dependable Distributed
  Systems.
Wiley.
 - Anderson and Dahlin, 2014
 - 
Anderson, T. and Dahlin, M. (2014).
Operating Systems: Principles and Practice.
Recursive Books, 2nd edition.
 - Annuzzi et al., 2013
 - 
Annuzzi, J., Darcey, L., and Conder, S. (2013).
Introduction to Android Application Development: Android
  Essentials.
Developer's Library. Pearson Education.
 - Appel, 2002
 - 
Appel, A. W. (2002).
Modern compiler implementation in Java.
Cambridge University Press, 2.a edición edition.
 - Apóstol, 1973
 - 
Apóstol, T. M. (1973).
Calculus Vol II.
Editorial Reverté.
 - Argandoña, 2006
 - 
Argandoña (2006).
La identidad cristiana del directivo de empresa.
IESE.
 - Association for Computing Machinery, 2008
 - 
Association for Computing Machinery (2008).
Digital Libray.
Association for Computing Machinery.
http://portal.acm.org/dl.cfm.
 - Aumasson, 2017
 - 
Aumasson, J.-P. (2017).
Serious Cryptography: A Practical Introduction to Modern
  Encryption.
No Starch Press.
 - Avi Silberschatz, 2012
 - 
Avi Silberschatz, Peter Baer Galvin, G. G. (2012).
Operating System Concepts, 9/E.
John Wiley & Sons, Inc.
 - Aziz et al., 2012
 - 
Aziz, A., Lee, T., and Prakash, A. (2012).
Elements of Programming Interviews: The Insiders' Guide.
ElementsOfProgrammingInterviews.com.
 - Bishop, 2002
 - 
Bishop, M. (2002).
Computer Security: Art and Science.
Addison-Wesley Professional.
 - Blum, 1992
 - 
Blum, B. I. (1992).
Software Engineering: A Holistic View.
Oxford University Press US, 7th edition.
 - Boneh and Shoup, 2020
 - 
Boneh, D. and Shoup, V. (2020).
Cryptography i.
https://crypto.stanford.edu/~dabo/cryptobook/BonehShoup_0_4.pdf.
 - Brenner, 2007
 - 
Brenner, J. F. (2007).
Cyberthreats: The Emerging Fault Lines of the Nation State.
Oxford University Press.
 - Brookshear, 1993
 - 
Brookshear, J. G. (1993).
Teoría de la Computación.
Addison Wesley Iberoamericana.
 - Brookshear and Brylow, 2019
 - 
Brookshear, J. G. and Brylow, D. (2019).
Computer Science: An Overview.
Pearson, global edition edition.
 - Burbano, 2006
 - 
Burbano, S. (2006).
Física General.
Alfaomega.
 - Burleson, 2004
 - 
Burleson, D. K. (2004).
Physical Database Design Using Oracle.
CRC Press.
 - Buxton, 2007
 - 
Buxton, B. (2007).
Sketching User Experiences: Getting the Design Right and the
  Right Design.
Morgan Kaufmann Publishers Inc.
 - Buyya et al., 2013
 - 
Buyya, R., Vecchiola, C., and Selvi, S. T. (2013).
Mastering Cloud Computing: Foundations and Applications
  Programming.
Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1st edition.
 - Cantú-Paz, 2000
 - 
Cantú-Paz, E. (2000).
Efficient and Accurate Parallel Genetic Algorithms.
Kluwer Academic Publishers, Norwell, MA, USA.
 - Cardona and García Lombardi, 2002
 - 
Cardona, P. and García Lombardi, P. (2002).
Cómo desarrollar las Competencias de Liderazgo.
PAD Lima- Perú, Tercera Edición.
 - Cardona and Peña, 
 - 
Cardona, P. and Peña, C. R.
Dirección por misiones: Cómo generar empresas de alto
  rendimiento.
 - Celko, 2005
 - 
Celko, J. (2005).
Joe Celko's SQL Programming Style.
Elsevier.
 - Chayapathi, 2016
 - 
Chayapathi, Rajendra; Syed F. Hassan; Shah, P. (2016).
Network Functions Virtualization (NFV) with a Touch of SDN.
Addison-Wesley Professional; 1 edition.
 - Chávez, 2011
 - 
Chávez, A. (2011).
Se necesita un tutor.
UCSP.
 - CiteSeer.IST, 2008
 - 
CiteSeer.IST (2008).
Scientific Literature Digital Libray.
College of Information Sciences and Technology, Penn State
  University.
http://citeseer.ist.psu.edu.
 - C.J, 2011
 - 
C.J, D. (2011).
SQL and Relational Theory: How to Write Accurate SQL Code.
O'Reilly Media.
 - Coello, 2007
 - 
Coello, C. A. C. (2007).
Evolutionary Algorithms for Solving Multi-Objective Problems
  (Genetic and Evolutionary Computation).
Springer, 2nd edition edition.
 - Conradi, 2000
 - 
Conradi, R. (2000).
Software Process Technology.
Springer.
 - Cormen et al., 2009
 - 
Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C. (2009).
Introduction to Algorithms.
MIT Press.
 - Coulouris et al., 2011a
 - 
Coulouris, G., Dollimore, J., Kindberg, T., and Blair, G. (2011a).
Distributed Systems: Concepts and Design.
Addison-Wesley.
 - Coulouris et al., 2011b
 - 
Coulouris, G., Dollimore, J., Kindberg, T., and Blair, G. (2011b).
Distributed Systems: Concepts and Design.
Addison-Wesley Publishing Company, USA, 5th edition.
 - Cuadros-Vargas et al., 2004
 - 
Cuadros-Vargas, E., Romero, R. A. F., Mock, M., and Brisaboa, N. (2004).
Implementing data structures: An incremental approach.
http://socios.spc.org .pe/ecuadros/cursos/pdfs/.
 - D' Souza, 
 - 
D' Souza, S. A.
Descubre tu Liderazgo.
Editorial Sal Terrae.
 - da Cruz, 2007
 - 
da Cruz, A. A. (2007).
Algoritmos Evolutivos com Inspiração Quântica para
  Problemas com Representação Numérica.
PhD thesis, Departamento de Engenharia Elétrica, Pontifícia
  Universidade Católica do Rio de Janeiro, Rio de Janeiro, Brasil.
(In Portuguese).
 - da Cruz, 2003
 - 
da Cruz, A. V. A. (2003).
Otimização de planejamento com restriçōes de precedência usando
  algoritmos genéticos e co-evolução cooperativa.
Master's thesis, Departamento de Engenharia Elétrica, Pontifícia
  Universidade Católica do Rio de Janeiro.
 - Dasgupta et al., 2006
 - 
Dasgupta, S., Papadimitriou, C., and Vazirani, U. (2006).
Algorithms.
McGraw-Hill Education.
 - De Castro, 2006
 - 
De Castro, L. (2006).
Fundamentals of natural computing: basic concepts, algorithms,
  and applications.
CRC Press.
 - de la Lengua Española, 2010
 - 
de la Lengua Española, R. A. (2010).
Nueva gramática de la lengua española, morfología y
  sintaxis.
Madrid, España: Ed. Espasa.
 - Deitel, 2017
 - 
Deitel, D. . (2017).
C++17- The Complete Guide.
Pearson, 10th edition.
 - Dietrich, 2001
 - 
Dietrich, S. W. (2001).
Understanding Relational Database Query Languages, First
  Edition.
Prentice Hall.
 - Dix et al., 2004
 - 
Dix, A., Finlay, J., Abowd, G., and Beale, R. (2004).
Human-computer Interaction.
Prentice-Hall, Inc, 3 ed. edition.
 - Dongarra, 2006
 - 
Dongarra, J. (2006).
Trends in high performance computing: a historical overview and
  examination of future developments.
Circuits and Devices Magazine, IEEE, 22(1):22–27.
 - Dustin et al., 2008
 - 
Dustin, E., Garrett, T., and Gauf, B. (2008).
Automated Software Testing: Introduction, Management, and
  Performance.
Addison-Wesley Professional.
 - Easttom, 2015
 - 
Easttom, C. (2015).
Computer Crime, Investigation, and the Law.
Jones & Bartlett Learning.
 - Ediciones, 2009a
 - 
Ediciones, D., editor (2009a).
Revista Datamation MC Ediciones.
 - Ediciones, 2009b
 - 
Ediciones, D., editor (2009b).
Understanding the Digital Economy.
 - Ediciones, 2010
 - 
Ediciones, D., editor (2010).
Financial Times Mastering Information Management.
 - El-Mihoub et al., 2006
 - 
El-Mihoub, T. A., Hopgood, A. A., Nolle, L., and Battersby, A. (2006).
Hybrid genetic algorithms: A review.
Engineering Letters, 13(2).
 - Emil Eifrem and Robinson, 2015
 - 
Emil Eifrem, J. W. and Robinson, I. (2015).
Graph Databases.
O'Reilly Media, 2nd edition.
 - Epp, 2010
 - 
Epp, S. S. (2010).
Discrete Mathematics with Applications.
4 ed. edition.
 - Fager et al., 2014
 - 
Fager, J., Yépez, W. L. P., Villacrés, M., Martinez, L. A. P., Ochoa, D., and
  Cuadros-Vargas, E. (2014).
Estructura de datos.
Iniciativa Latinoamericana de Libros de Texto Abiertos (LATIN), first
  edition edition.
 - Fogel, 1995
 - 
Fogel, D. B. (1995).
Evolutionary Computation. Toward a New Philosophy of Machine
  Intelligence.
The Institute of Electrical and Electronic Engineers, New York.
 - for Computing Machinery (ACM), 1992
 - 
for Computing Machinery (ACM), A. (1992).
Acm code of ethics and professional conduct.
 - Gamma et al., 1994
 - 
Gamma, E., Helm, R., Johnson, R., and Vlissides, J. M. (1994).
Design Patterns: Elements of Reusable Object-Oriented Software.
Computing Series. Addison-Wesley Professional.
ISBN-10: 0201633612.
 - Ginebra and Serrabou, 2010
 - 
Ginebra, G. and Serrabou, G. G. (2010).
Gestión de incompetentes. Libros de Cabecera.
 - Goldberg, 1989
 - 
Goldberg, D. (1989).
Genetic Algorithms in Search, Optimization and Machine
  Learning.
Addison Wesley.
 - Goleman, 1997
 - 
Goleman, D. (1997).
La Inteligencia Emocional.
J Vergara editores.
 - Gollmann, 2010
 - 
Gollmann, D. (2010).
Computer Security.
Wiley.
 - Goodrich and Tamassia, 2009
 - 
Goodrich, M. T. and Tamassia, R. (2009).
Algorithm Design: Foundations, Analysis and Internet Examples.
John Wiley & Sons, Inc., 2nd edition.
 - Graeme Simsion, 2004
 - 
Graeme Simsion, G. W. (2004).
Data Modeling Essentials, Third Edition.
Morgan Kaufmann.
 - Grimaldi, 1997
 - 
Grimaldi, R. (1997).
Matemáticas Discretas y Combinatoria.
Addison Wesley Iberoamericana.
 - Grimaldi, 2003
 - 
Grimaldi, R. (2003).
Discrete and Combinatorial Mathematics: An Applied
  Introduction.
Pearson, 5 ed. edition.
 - Grove, 2009
 - 
Grove, R. (2009).
Web Based Application Development.
Jones & Bartlett Learning.
 - Halim, 2013
 - 
Halim, S. (2013).
Competitive Programming.
Lulu, 3 rd edition.
 - Hawkins, 2012
 - 
Hawkins, P. (2012).
Coaching y liderazgo de equipos: coaching para un liderazgo con
  capacidad de transformación.
Ediciones Granica.
 - Haykin, 1999
 - 
Haykin, S. (1999).
Neural networks: A Comprehensive Foundation.
Prentice Hall.
 - Hearn and Baker, 1990
 - 
Hearn, D. and Baker, P. (1990).
Computer Graphics in C.
Prentice Hall.
 - Hennessy and Patterson, 2006
 - 
Hennessy, J. L. and Patterson, D. A. (2006).
Computer Architecture: A Quantitative Approach.
Morgan Kaufman, San Mateo, CA, 4th edition.
 - Hernández, 2006
 - 
Hernández, A. (2006).
Ética Actual y Profesional. Lecturas para la Convivencia Global
  en el Siglo XXI.
Ed. Thomson.
 - Hersey et al., 1998
 - 
Hersey, P., Blanchard, K. H., and Johnson, D. E. (1998).
Administración del comportamiento organizacional: liderazgo
  situacional.
 - Hirsh and Smale, 1974
 - 
Hirsh, M. W. and Smale, S. (1974).
Differential Equatons, Dynamical Systems, and Linear Álgebra.
Academia Press.
 - Holland, 1975
 - 
Holland, J. H. (1975).
Adaptation in Natural and Artificial Systems.
University of Michigan Press, Ann Arbor, Michigan, first edition.
 - Hopcroft and Ullman, 2008
 - 
Hopcroft, J. E. and Ullman, J. D. (2008).
Introducción a la Teoría de Autómatas, Lenguajes y
  Computación.
Pearson Educacion.
 - Hughes et al., 2013
 - 
Hughes, J. F., Dam, A. V., Mcguire, M., Sklar, D. F., Foley, J. D., Feiner,
  S. K., and Akeley, K. (2013).
Computer Graphics - Principles and Practice 3rd Edition.
Addison-Wesley.
 - Humble and Farley, 2010
 - 
Humble, J. and Farley, D. (2010).
Continuous Delivery: Reliable Software Releases through Build,
  Test, and Deployment Automation.
Addison-Wesley Professional.
 - Hunsaker, 2010
 - 
Hunsaker, P. (2010).
El nuevo arte de gestionar equipos: Un enfoque actual para guiar
  y motivar con éxito.
 - Hwang et al., 2011
 - 
Hwang, K., Dongarra, J., and Fox, G. C. (2011).
Distributed and Cloud Computing: From Parallel Processing to the
  Internet of Things.
Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1st edition.
 - IEEE, 2004
 - 
IEEE (2004).
Ieee code of ethics.
IEE.
 - IEEE-Computer Society, 2008
 - 
IEEE-Computer Society (2008).
Digital Libray.
IEEE-Computer Society.
http://www.computer.org/publications/dlib.
 - ión, 2014
 - 
ión, R. L. (2014).
Calculus.
10th edition.
 - Johnson, 2010
 - 
Johnson, J. (2010).
Designing with the Mind in Mind: Simple Guide to Understanding
  User Interface Design Rules.
Morgan Kaufmann Publishers Inc., 3 ed. edition.
 - Johnson, 1991
 - 
Johnson, M. (1991).
Superscalar microprocessor design.
Prentice Hall series in innovative technology. Prentice Hall.
 - Johnsonbaugh, 1999
 - 
Johnsonbaugh, R. (1999).
Matemáticas Discretas.
Prentice Hall, México.
 - Jr, 2000
 - 
Jr, R. M. (2000).
Sistemas de Información Gerencial.
Prentice Hall.
 - Kadushin, 2011
 - 
Kadushin, C. (2011).
Understanding Social Networks: Theories, Concepts, And
  Findings.
Oxford University Press, Usa; 1 edition.
 - Katz and Lindell, 2014
 - 
Katz, J. and Lindell, Y. (2014).
Introduction to Modern Cryptography.
CRC press.
 - Kelley, 1995
 - 
Kelley, D. (1995).
Teoría de Autómatas y Lenguajes Formales.
Prentice Hall.
 - Keyes, 2004
 - 
Keyes, J. (2004).
Software Configuration Management.
CRC Press.
 - Kirk and mei W. Hwu, 2013
 - 
Kirk, D. B. and mei W. Hwu, W. (2013).
Programming Massively Parallel Processors: A Hands-on Approach.
Morgan Kaufmann, 2nd edition.
 - Kleinberg and Tardos, 2005
 - 
Kleinberg, J. and Tardos, E. (2005).
Algorithm Design.
Addison-Wesley Longman Publishing Co., Inc.
 - Knapp and Brenner, 2012
 - 
Knapp, E. M. and Brenner, J. (2012).
Cybersecurity and Global Security: Threats and Mitigation.
Springer.
 - Knuth, 1997a
 - 
Knuth, D. (1997a).
The Art of Computer Programming: Fundamental algorithms Vol 1.
Addison-Wesley, third edition edition.
 - Knuth, 1997b
 - 
Knuth, D. E. (1997b).
The Art of Computer Programming, Vol. 1: Fundamental
  Algorithms.
Addison-Wesley Professional, 3rd edition.
 - Knuth, 1998
 - 
Knuth, D. E. (1998).
The art of computer programming, volume 3:Sorting and
  searching.
Addison-Wesley Professional, 2nd edition.
 - Knuth, 2007a
 - 
Knuth, D. E. (2007a).
The Art of Computer Programming, Fundamental Algorithms,
  volume I.
Addison-Wesley, 3rd edition.
0-201-89683-4.
 - Knuth, 2007b
 - 
Knuth, D. E. (2007b).
The Art of Computer Programming, Sorting and Searching,
  volume II.
Addison-Wesley, 2nd edition.
0-201-89685-0.
 - Koller and Friedman, 2009
 - 
Koller, D. and Friedman, N. (2009).
Probabilistic Graphical Models: Principles and Techniques -
  Adaptive Computation and Machine Learning.
The MIT Press.
 - Korth and Silberschatz, 2002
 - 
Korth, H. F. and Silberschatz, A. (2002).
Fundamentos de Base de Datos.
McGraw-Hill.
 - Koza, 1992
 - 
Koza, J. R. (1992).
Genetic Programming. On the Programming of Computers by Means of
  Natural Selection.
The MIT Press, Cambridge, Massachusetts.
 - Kulikov, 2019
 - 
Kulikov, A. S. (2019).
Learning Algorithms Through Programming and Puzzle Solving.
Active Learning Technologies.
 - Kurose and Ross, 2013
 - 
Kurose, J. and Ross, K. (2013).
Computer Networking: A Top-down Approach.
Always learning. Pearson, 7th edition.
 - Kurose and Ross, 2016
 - 
Kurose, J. F. and Ross, K. W. (2016).
Computer Networking: A Top-Down Approach.
Pearson.
 - Laaksonen, 2017
 - 
Laaksonen, A. (2017).
Guide to Competitive Programming: Learning and Improving
  Algorithms Through Contests.
Stringer.
 - Larman, 2008
 - 
Larman, C. (2008).
Applying UML and Patterns.
Prentice Hall.
 - Laudon and Laudon, 2004
 - 
Laudon, K. C. and Laudon, J. P. (2004).
Sistemas de Información Gerencial.
Prentice Hall.
 - Laudon and Laudon, 2017
 - 
Laudon, K. C. and Laudon, J. P. (2017).
Management Information Systems: Managing the Digital Firm.
Pearson, 15th edition.
 - Leavitt and Shneiderman, 2006
 - 
Leavitt, M. and Shneiderman, B. (2006).
Research-Based Web Design & Usability Guidelines.
Health and Human Services Dept.
 - Louden, 2004a
 - 
Louden, K. C. (2004a).
Compiler Construction: Principles and Practice.
Thomson.
 - Louden, 2004b
 - 
Louden, K. C. (2004b).
Lenguajes de Programacion.
Thomson.
 - Loza, 2000
 - 
Loza, C. (2000).
El aporte de la doctrina social de la iglesia a la toma de decisiones
  empresariales.
Separata ofrecida por el profesor.
 - Luis., 2008
 - 
Luis., H. (2008).
Construye tu Sueño.
LID Editorial Empresarial.
 - M. Tamer Ozsu, 1999
 - 
M. Tamer Ozsu, P. V. (1999).
Principles of Distributed Database Systems, Second Edition.
Prentice Hall.
 - Majorana, 1958
 - 
Majorana, A. (1958).
El arte de hablar en publico.
La España Moderna.
 - Manuel., 2009
 - 
Manuel., F. P. (2009).
Gobierno de Personas en la Empresa.
Ediciones Universidad de Navarra EUNSA.
 - Manzone, 2007
 - 
Manzone, G. (2007).
La Responsabilidad de la Empresa, Business Ethics y Doctrina
  Social de la Iglesia en Diálogo.
Universidad Católica San Pablo.
 - Mark Whitehorn, 2001
 - 
Mark Whitehorn, B. M. (2001).
Inside Relational Databases, Second Edition.
Springer.
 - Marschner and Shirley, 2016
 - 
Marschner, S. and Shirley, P. (2016).
Fundamentals of Computer Graphics.
CRC Press, fourth edition edition.
 - Maruja., 2007
 - 
Maruja., C. N. (2007).
Dueños de Nuestro Destino.
Editorial Ariel.
 - Mathis, 2011
 - 
Mathis, L. (2011).
Designed for Use: Create Usable Interfaces for Applications and
  the Web.
Pragmatic Bookshelf.
 - Matloff, 2014
 - 
Matloff, N. (2014).
Programming on Parallel Machines.
University of California, Davis.
 - McGraw, 2006
 - 
McGraw, G. (2006).
Software Security: Building Security In.
Addison-Wesley Professional.
 - Mendenhall, 2014
 - 
Mendenhall, B. (2014).
Introducción a la probabilidad y estadística.
Cengage Learning, 13th edition.
 - Micha, 1998
 - 
Micha, E. (1998).
Matemáticas Discretas.
Limusa.
 - Michalewicz, 1996
 - 
Michalewicz, Z. (1996).
Genetic Algorithms + Data Structures = Evolution Programs.
Springer-Verlag.
 - Michalewicz, 2000
 - 
Michalewicz, Z. (2000).
Introduction to constraint-handling tecniques, decoders, repair
  algorithms, constraint-preserving operators.
Evolutionary Computation 2, Advanced Algorithms and Operators,
  pages 38–40,49–55,56–61,62–68.
 - Miguel A. Revilla, 2003
 - 
Miguel A. Revilla, S. S. (2003).
Programming Challenges: The Programming Contest Training
  Manual.
Springer.
 - Mitchell, 1998
 - 
Mitchell, M. (1998).
An introduction to genetic algorithms.
The MIT press.
 - Mitchell, 2004
 - 
Mitchell, M. (2004).
An Introduction to Genetic Algorithms: Complex Adaptative
  Systems.
The MIT Press.
 - Mitnick and Simon, 2002
 - 
Mitnick, K. D. and Simon, W. L. (2002).
The Art of Deception: Controlling the Human Element of
  Security.
Wiley.
 - Monroe and Ehninger, 1976
 - 
Monroe, A. and Ehninger, D. (1976).
La comunicación, oral.
Oral Edit Hispano Europea Barcelona.
 - Montangero, 1996
 - 
Montangero, C. (1996).
Software Process Technology.
Springer.
 - M.Ross, 2014
 - 
M.Ross, S. (2014).
Introduction to Probability and Statistics for Engineers and
  Scientists.
Academic Press, 5th edition.
 - Murphy, 2012
 - 
Murphy, K. P. (2012).
Machine Learning: A Probabilistic Perspective.
The MIT Press.
 - Nakariakov, 2013
 - 
Nakariakov, S. (2013).
The Boost C++ Libraries: Generic Programming.
CreateSpace Independent Publishing Platforml.
 - National Institute of Standards and Technology, 2003
 - 
National Institute of Standards and Technology (2003).
Building an information technology security awareness and training
  program.
Technical Report NIST Special Publication 800-50, National Institute
  of Standards and Technology.
 - National Institute of Standards and Technology,
  2008
 - 
National Institute of Standards and Technology (2008).
Guide to general server security.
Technical Report NIST Special Publication 800-123, National Institute
  of Standards and Technology.
 - National Institute of Standards and Technology,
  2011
 - 
National Institute of Standards and Technology (2011).
Information security continuous monitoring (iscm) for federal
  information systems and organizations.
Technical Report NIST Special Publication 800-137, National Institute
  of Standards and Technology.
 - National Institute of Standards and Technology,
  2012a
 - 
National Institute of Standards and Technology (2012a).
Computer security incident handling guide.
NIST Special Publication NIST Special Publication 800-61 Rev. 2,
  National Institute of Standards and Technology.
 - National Institute of Standards and Technology,
  2012b
 - 
National Institute of Standards and Technology (2012b).
Guide for conducting risk assessments.
NIST Special Publication NIST Special Publication 800-30 Rev. 1,
  National Institute of Standards and Technology.
 - National Institute of Standards and Technology,
  2014
 - 
National Institute of Standards and Technology (2014).
Guidelines for media sanitization.
NIST Special Publication NIST Special Publication 800-88 Rev. 1,
  National Institute of Standards and Technology.
 - National Institute of Standards and Technology,
  2016
 - 
National Institute of Standards and Technology (2016).
Systems Security Engineering: Considerations for a
  Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems.
Number 800-160 Vol. 1 in NIST Special Publication.
 - National Institute of Standards and Technology,
  2017a
 - 
National Institute of Standards and Technology (2017a).
Digital identity guidelines.
NIST Special Publication NIST Special Publication 800-63-3, National
  Institute of Standards and Technology.
 - National Institute of Standards and Technology,
  2017b
 - 
National Institute of Standards and Technology (2017b).
An introduction to computer security: The nist handbook.
NIST Special Publication 800-12 Rev. 1, National Institute of
  Standards and Technology.
 - Nieburh, 2003
 - 
Nieburh, R. (2003).
El Yo Responsable. Ensayo de Filosofía Moral Cristiana.
Bilbao.
 - Nilsson, 2001
 - 
Nilsson, N. (2001).
Inteligencia Artificial: Una nueva visión.
McGraw-Hill.
 - Norman, 2004
 - 
Norman, D. A. (2004).
Emotional Design: Why We Love (or Hate) Everyday Things.
Basic Book.
 - Olson and Turner, 2008
 - 
Olson, D. L. and Turner, S. (2008).
Enhancing user trust and awareness through usable security feedback.
In Proceedings of the 2008 Workshop on New Security Paradigms,
  pages 83–92.
 - Oquendo, 2003
 - 
Oquendo, F. (2003).
Software Process Technology.
Springer.
 - Pacheco, 2011
 - 
Pacheco, P. S. (2011).
An Introduction to Parallel Programming.
Morgan Kaufmann, 1st edition.
 - para las Comunicaciones Sociales, 2002
 - 
para las Comunicaciones Sociales, P. C. (2002).
Ética en Internet.
 - Parhami, 2002
 - 
Parhami, B. (2002).
Introduction to parallel processing: algorithms and
  architectures.
Plenum series in computer science. Plenum Press.
 - Parhami, 2005
 - 
Parhami, B. (2005).
Computer Architecture: From Microprocessors to Supercomputers.
Oxford Univ. Press, New York.
 - Patterson and Hennessy, 2014
 - 
Patterson, D. A. and Hennessy, J. L. (2014).
Computer Organization and Design: The Hardware/Software
  Interface.
Morgan Kaufman, San Mateo, CA, 5 edition.
 - Pavis, 1998
 - 
Pavis, P. (1998).
Diccionario del Teatro.
Edit. Piados BA.
 - Perez, 2010
 - 
Perez, A. (2010).
Teoría del Derecho.
Editorial Madrid.
 - Peter Brusilovsky, 1998
 - 
Peter Brusilovsky, Alfred Kobsa, J. V. (1998).
Adaptive Hypertext and Hypermedia, First Edition.
Springer.
 - Peter Rob, 2004
 - 
Peter Rob, C. C. (2004).
Database Systems: Design, Implementation and Management, Sixth
  Edition.
Morgan Kaufmann.
 - Peterson and Davie, 2011
 - 
Peterson, L. L. and Davie, B. S. (2011).
Computer Networks: A Systems Approach.
Morgan Kaufmann.
 - Pfleeger and Pfleeger, 2006
 - 
Pfleeger, C. P. and Pfleeger, S. L. (2006).
Security in Computing.
Prentice Hall.
 - PGregory Shakhnarovich and Indyk, 2006
 - 
PGregory Shakhnarovich, T. D. and Indyk, P. (2006).
Nearest-Neighbor Methods in Learning and Vision: Theory and
  Practice.
MIT Press, 1st edition.
ISBN 0-262-19547-X.
 - Philip A. Bernstein, 1997
 - 
Philip A. Bernstein, E. N. (1997).
Principles of Transaction Processing, First Edition.
Morgan Kaufmann.
 - Ponce-Gallegos et al., 2014
 - 
Ponce-Gallegos, J., Torres-Soto, A., tima Quezada Aguilera, Silva-Sprock, A.,
  Flor, E. M., Casali, A., Scheihing, E., Tupac, Y., Soto, M. T., Zapata,
  F. O., A., J. H., D., C. Z., Vakhnia, N., and Pedreño, O. (2014).
Inteligencia Artificial.
Iniciativa Latinoamericana de Libros de Texto Abiertos (LATIn).
 - Pressman, 2004
 - 
Pressman, R. S. (2004).
Software Engineering: A Practitioner's Approach.
McGraw-Hill, 6th edition.
 - Pressman, 2005
 - 
Pressman, R. S. (2005).
Software Engineering: A Practitioner's Approach.
McGraw-Hill, 6th edition.
 - Pressman and Maxim, 2015
 - 
Pressman, R. S. and Maxim, B. (2015).
Software Engineering: A Practitioner's Approach.
McGraw-Hill, 8th edition.
 - Priest and Sanchez, 2001
 - 
Priest, J. W. and Sanchez, J. M. (2001).
Product Development and Design for Manufacturing.
Marcel Dekker.
 - Pérez López, 1998
 - 
Pérez López, J. A. (1998).
Liderazgo y Ética en la Dirección de Empresas.
Bilbao.
 - Quinn, 2003
 - 
Quinn, M. J. (2003).
Parallel Programming in C with MPI and OpenMP.
McGraw-Hill Education Group, 1st edition.
 - Quintana, 2007
 - 
Quintana, V. (2007).
El estudio Universitario y elementos de investigación
  científica.
Editorial universitaria.
 - Ramakrishnan and Gehrke, 2003
 - 
Ramakrishnan, R. and Gehrke, J. (2003).
Database Management Systems.
McGraw-Hill, 3rd edition.
 - Ramez Elmasri, 2004
 - 
Ramez Elmasri, S. B. N. (2004).
Fundamentals of Database Systems, Fourth Edition.
Addison Wesley.
 - Rawlins, 1992
 - 
Rawlins, G. (1992).
Compared to What?: An Introduction to the Analysis of
  Algorithms.
Computer Science Press.
 - Reese, 2013
 - 
Reese, M. (2013).
Understanding and Using C Pointers.
Inc.
 - Resnik, 2007
 - 
Resnik, R. y Halliday, D. (2007).
Física, volume 1.
Patria, 5th edition.
 - Reynolds, 1994
 - 
Reynolds, R. G. (1994).
An Introduction to Cultural Algorithms.
In Sebald, A. V., , and Fogel, L. J., editors, Proceedings of
  the Third Annual Conference on Evolutionary Programming, pages 131–139.
  World Scientific, River Edge, New Jersey.
 - Rivest and Stein, 2009
 - 
Rivest, T. H. C. C. E. L. . R. L. and Stein, C. (2009).
Introduction to Algorithms, Third Edition.
The MIT Press, 3rd edition.
 - Rodríguez, 2007
 - 
Rodríguez, J. (2007).
Guía para el método de estudio universitario.
Educa.
 - Rogers and Sharp, 2011
 - 
Rogers, Y. and Sharp, H. & Preece, J. (2011).
Interaction Design: Beyond Human-Computer Interaction.
John Wiley and Sons Ltd, 3 ed. edition.
 - Rosen, 2007
 - 
Rosen, K. H. (2007).
Discrete Mathematics and Its Applications.
7 ed. edition.
 - Rozenberg et al., 2012
 - 
Rozenberg, G., Bäck, T., and Kok, J. N., editors (2012).
Handbook of Natural Computing.
Springer Publishing Company, Incorporated, 1st edition.
 - Russell and Norvig, 2003
 - 
Russell, S. and Norvig, P. (2003).
Inteligencia Artifical: Un enfoque moderno.
Prentice Hall.
 - Saltzer and Schroeder, 1975
 - 
Saltzer, J. H. and Schroeder, M. D. (1975).
The protection of information in computer systems.
Proceedings of the IEEE, 63(9):1278–1308.
 - Samet, 2006
 - 
Samet, H. (2006).
Foundations of Multidimensional and Metric Data Structures.
Elsevier/Morgan Kaufmann, illustrated edition.
 - Sanders and Kandrot, 2010
 - 
Sanders, J. and Kandrot, E. (2010).
CUDA by Example: An Introduction to General-Purpose GPU
  Programming.
Addison-Wesley Professional, 1st edition.
 - Schach, 2004
 - 
Schach, S. R. (2004).
Object-Oriented and Classical Software Engineering.
McGraw-Hill.
 - Scheinerman, 2012
 - 
Scheinerman, E. R. (2012).
Mathematics: A Discrete Introduction.
3 ed. edition.
 - Schmidt, 1995a
 - 
Schmidt, E. (1995a).
Etica y negocios par América latina.
Universidad del Pacifico Lima.
 - Schmidt, 1995b
 - 
Schmidt, E. (1995b).
Ética y Negocios para América Latina.
Universidad del Pacífico.
 - Schneier, 2015
 - 
Schneier, B. (2015).
Data and Goliath: The Hidden Battles to Collect Your Data and
  Control Your World.
W. W. Norton & Company.
 - Seacord, 2005
 - 
Seacord, R. C. (2005).
Secure Coding in C and C++.
Addison-Wesley Professional.
 - Sedgewick and Flajolet, 2013
 - 
Sedgewick, R. and Flajolet, P. (2013).
An Introduction to the Analysis of Algorithms.
Pearson Education.
 - Sedgewick and Wayne, 2011
 - 
Sedgewick, R. and Wayne, K. (2011).
Algorithms.
Pearson Education.
 - Serway, 2009
 - 
Serway, R. A. y Jewett, J. (2009).
Física para Ciencias e Ingeniería con Física Moderna,
  volume 1.
Cengage Learning, 7th edition.
 - Sipser, 2012
 - 
Sipser, M. (2012).
Introduction to the Theory of Computation (third edition).
Publisher: Cengage Learning.
 - Smith and Coit, 2000
 - 
Smith, A. E. and Coit, D. W. (2000).
Penalty functions.
Evolutionary Computation 2, Advanced Algorithms and Operators,
  pages 41–48.
 - Solove, 2006
 - 
Solove, D. J. (2006).
A taxonomy of privacy.
University of Pennsylvania Law Review, 154(3):477–564.
 - Sommerville, 2008
 - 
Sommerville, I. (2008).
Software Engineering.
Addison Wesley, 7th edition.
ISBN: 0321210263.
 - Sommerville, 2017
 - 
Sommerville, I. (2017).
Software Engineering.
Pearson, 10th edition.
 - Stallings, 2005
 - 
Stallings, W. (2005).
Operating Systems: Internals and Design Principles, 5/E.
Prentice Hall.
 - Stallings, 2018
 - 
Stallings, W. (2018).
Computer Organization and Architecture: Designing for
  Performance.
Pearson.
 - Stevens and Fall, 2011
 - 
Stevens, W. R. and Fall, K. R. (2011).
TCP/IP Illustrated, Volume 1: The Protocols.
Addison-Wesley Professional.
 - Stewart, 2012
 - 
Stewart, J. (2012).
Calculus.
7th edition.
 - Stone et al., 2005
 - 
Stone, D., Jarrett, C., Woodroffe, M., and Minocha, S. (2005).
User Interface Design and Evaluation.
Morgan Kaufmann Series in Interactive Technologies.
 - Storn and Price, 1995
 - 
Storn, R. and Price, K. (1995).
Differential Evolution: A Simple and Efficient Adaptive
  Scheme for Global Optimization over Continuous Spaces.
Technical Report TR-95-012, International Computer Science Institute,
  Berkeley, California.
 - Strang, 2003
 - 
Strang, G. (2003).
Introduction to Linear Algebra, 3rd edición.
Wellesley-Cambridge Press.
 - Stroustrup, 2013a
 - 
Stroustrup, B. (2013a).
The C++ Programming Language.
Addison-Wesley, 4th edition.
 - Stroustrup, 2013b
 - 
Stroustrup, B. (2013b).
The C++ Programming Language, 4th edition.
Addison-Wesley.
 - Tanenbaum, 2001
 - 
Tanenbaum, A. S. (2001).
Modern Operating Systems, 4/E.
Prentice Hall.
 - Tanenbaum, 2006
 - 
Tanenbaum, A. S. (2006).
Operating Systems Design and Implementation, 3/E.
Prentice Hall.
 - Tanenbaum and Wetherall, 2010
 - 
Tanenbaum, A. S. and Wetherall, D. J. (2010).
Computer Networks.
Prentice Hall.
 - Tarjan, 1983
 - 
Tarjan, R. E. (1983).
Data Structures and Network Algorithms.
Society for Industrial and Applied Mathematics.
 - Tavani, 2011
 - 
Tavani, H. T. (2011).
Ethics and Technology: Controversies, Questions, and Strategies
  for Ethical Computing.
Wiley.
 - Teufel and Schmidt, 1998
 - 
Teufel, B. and Schmidt, S. (1998).
Fundamentos de Compiladores.
Addison Wesley Iberoamericana.
 - Tipler, 2009
 - 
Tipler, P. y Mosca, G. (2009).
Física para la ciencia y la tecnología, volume 1.
Reverte, 7th edition.
 - Toppo and Dewan, 2013
 - 
Toppo, N. and Dewan, H. (2013).
Pointers in C: A Hand on Approach.
Apress.
 - Velazco, 1999
 - 
Velazco, M. F. (1999).
Mapas conceptuales en el aula.
Ed. San Marcos.
 - W and L, 2014
 - 
W, S. and L, B. (2014).
Computer Security: Principles and Practice.
Pearson Education, Limited.
 - Wang and King, 2000
 - 
Wang, Y. and King, G. (2000).
Software Engineering Processes: Principles and Applications.
CRC Press.
 - Weise, 2009
 - 
Weise, T. (2009).
Global optimization algorithms - theory and application.
http://www.it-weise.de.
 - Whittaker and Thompson, 2012
 - 
Whittaker, J. A. and Thompson, H. H. (2012).
How to Break Software Security.
Addison-Wesley Professional.
 - Wigdor and Wixon, 2011
 - 
Wigdor, D. and Wixon, D. (2011).
Brave NUI World: Designing Natural User Interfaces for Touch and
  Gesture.
Morgan Kaufmann Publishers Inc.
 - Wilkinson., 2009
 - 
Wilkinson., C. P. H. (2009).
Creciendo como Líder.
Ediciones Universidad de Navarra S.A (EUNSA), Primera Edición.
 - Windle and Abreo, 2002
 - 
Windle, D. R. and Abreo, L. R. (2002).
Software Requirements Using the Unified Process.
Prentice Hall.
 - Yurichev, 2014
 - 
Yurichev, D. (2014).
Reverse Engineering for Beginners.
Independently published.
 - Zezula et al., 2007
 - 
Zezula, P., Amato, G., Dohnal, V., and Batko, M. (2007).
Similarity Search: The Metric Space Approach.
Springer, 1st edition.
ISBN-10: 0387291466.
 - Zill, 2002
 - 
Zill, D. G. (2002).
Ecuaciones Diferenciales con Problemas de Valores en la
  Frontera.
Thomson Learning.
 - Zill, 2013
 - 
Zill, D. G. (2013).
Differential equations with Boundary value problems.
CENGAGE Learning, 8th edition.
 
Generado por Ernesto Cuadros-Vargas ,               Sociedad Peruana de Computación-Peru,               basado en el modelo de la Computing Curricula de               IEEE-CS/ACM