انتشارات Wiley

Clustering
Rui Xu, Don Wunsch, 2008
Introduction to Evolvable Hardware: A Practical Guide for Designing Self-Adaptive Systems
Garrison W. Greenwood, Andrew M. Tyrrell, 2006
Mathematical Methods in Artificial Intelligence
Edward A. Bender, 1996
Mathematical Methods in Artificial Intelligence
Edward A. Bender, 1996
Applied cryptography
Bruce Schneier, 1995
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson, Bruce Schneier, Tadayoshi Kohno, 2010
Cryptology Unlocked
Reinhard Wobst, Angelika Shafir, 2007
Cryptology Unlocked
Reinhard Wobst, Angelika Shafir, 2007
Malicious Cryptography: Exposing Cryptovirology
Adam Young, Moti Yung, 2004
Malicious Cryptography: Exposing Cryptovirology
Adam Young, Moti Yung, 2004
Practical Cryptography
Niels Ferguson, Bruce Schneier, 2003
Public key cryptography: applications and attacks
Lynn Margaret Batten, 2013
A Grammar of Old English: Morphology
Richard M. Hogg, R. D. Fulk, 2011
A Grammar of Old English: Morphology, Volume 2
Richard M. Hogg, R. D. Fulk(auth.), 2011
Access 2007 all-in-one desk reference for dummies
Alan Simpson; Margaret Levine Young; Alison Barrows, 2007
Access 2007 Bible
Michael R. Groh, Joseph C. Stockman, Gavin Powell, Cary N. Prague, Michael R. Irwin, Jennifer Reardon, 2007
Access 2007 VBA bible : for data-centric Microsoft Office applications
Helen Bell Feddema, 2007
Access 2007 VBA programming for dummies
Joseph C Stockman; Alan Simpson, 2007
Access 2010 Bible
Michael R. Groh, 2010
Access Forms & Reports for Dummies
Brian Underdahl, 2006
Access Forms & Reports For Dummies
Brian Underdahl, 2006
Access Forms & Reports For Dummies
Brian Underdahl, 2006
Access forms & reports for dummies
Brian Underdahl, 2006