انتشارات Wiley

Beginning Microsoft SQL Server 2012 Programming
Paul Atkinson, Robert Vieira, 2012
Beginning Microsoft SQL Server 2012 programming
Robert Sheldon, Geoff Moes, 2012
Beginning Oracle Application express
Rick Greenwald, 2009
Beginning Oracle Application Express
Rick Greenwald, 2008
Beginning SQL
Paul Wilton, John Colby, 2005
Beginning SQL
Paul Wilton; John W Colby, 2005
Beginning SQL
Paul Wilton; John W Colby, 2005
Beginning T-SQL with Microsoft SQL Server 2005 and 2008
Paul Turley, Dan Wood, 2008
Clustering
Rui Xu, Don Wunsch, 2008
Data mining with SQL Server 2005
Zhaohui Tang; Jamie MacLennan, 2005
Discovering SQL : a hands-on guide for beginners
Alex Kriegel; Boris M Trukhnov, 2011
Enterprise Risk Management: From Incentives to Controls
James Lam, 2003
Interaction design: beyond human-computer interaction
Jenny Preece, Yvonne Rogers, Helen Sharp, 2002
Interaction Desing: Beyond Human-Computer Interaction
Jenny Preece, Rogers, Lauran Paine, 2011
Organizational Behavior
Michael A. Hitt, Adrienne Colella, C. Chet Miller, 2010
Revolutionizing IT: The Art of Using Information Technology Effectively
David H. Andrews, Kenneth R. Johnson, 2002
The Blackwell Guide to Kant's Ethics
Thomas Hill Jr., 2009
The Blackwell Guide to Kant's Ethics (Blackwell Guides to Great Works)
Thomas Hill Jr., 2009
The SSCP Prep Guide: Mastering the Seven Key Areas of System Security
Debra S. Isaac, Michael J. Isaac, 2003
ASP.NET at Work: Building 10 Enterprise Projects
Eric A. Smith, 2002
Blackjacking: Security Threats to Blackberry, PDA's, and Cell Phones in the Enterprise
Daniel V. Hoffman, 2007
Business Components Factory: A Comprehensive Overview of Component-Based Development for the Enterprise
Peter Herzum, Oliver Sims, 1999