SEARCH_RESULTS:

BOOK_NAME AUTHOR CLASS_CODE YOFP
AN INTEGRATED APPROACH TO SOFTWARE ENGINEERING 005.3 / J A I
Software requirements and Estimation 005.1 / K I S
SQL, PL/SQL the Programming Language of Oracle 005.133 / B A Y
Database system concepts 005.74 / S I L
Microsoft® Windows server 2008: The complete Reference 005.4 / R U E
Practical ASP 005.7 / B A Y
WEB TECHNOLOGIES: TCP/IP, JAVA Programming, and Cloud Computing 006.7 / G O D
J2ME: The complete reference 005.133 / k e o
Asia-Pacific between Conflict and Reconciliation 320.95/A S I
International Curriculum For Chinese Language Education 495.1/I N T
The Political Role Of Palestinian Women in the 1930s 305.4209564/A B D
Voices of Palestinian women : a 2009 report on Israels human rights violations against Palestinian women 323.34/V O I
Sleepless in Gaza Israeli drone war on the Gaza strip 327.12/A B U
war crimes against children 364.15 / w a r
Beyond De Linking : Development by popular protection vs. Development by stats 338.9564/S A M
Annotated Bibliography Selected Material On Jerusalem 1995-2001 015.564/A N N
Report on Palestinian women perception of protection 362.83/R E P
Ascd Lexicon of Learning R/370.3/A
Policies to promote female entrepreneurship In the Palestinian territory 338.04082/S A D
A DICTIONARY OF APPLIED LINGUISTICS : ENGLISH_ ARABIC R / 423.1 / K H U
The Palestinian Refugees Tragedy and Loss 325.2/A B D
Marketing Arab and Foreign Perspectives 658.8/A B O
Data Structures 005.73/A G R
Information Technology Class X 005.7/S A X
Effective library systems and practices 023/K O C
Media and Protocol 302.2/H A M
Security strategies in Windows platforms and applications 005.8/S O L
Deep learning with Python : learn best practices of deep learning models with PyTorch 005.133/K E T
Applied cryptography in .NET and Azure Key Vault : a practical guide to encryption in .NET and .NET Core 003.54/H A U
Introduction to Algorithms for Data Mining and Machine Learning 006.312/Y A N
COPYRIGHT © 2007-2025