|
AN INTEGRATED APPROACH TO SOFTWARE ENGINEERING |
Pankaj Jaiote |
005.3 / J A I |
2005 |
|
Software requirements and Estimation |
Swapna Kishore
Rajesh Naik |
005.1 / K I S |
2014 |
|
SQL, PL/SQL the Programming Language of Oracle |
Ivan Bayross |
005.133 / B A Y |
2015 |
|
Database system concepts |
Abraham Silberschatz
Henry F Korth
S Sudarshan |
005.74 / S I L |
2015 |
|
Microsoft® Windows server 2008: The complete Reference |
Danielle Ruest
Nelson Ruest |
005.4 / R U E |
2014 |
|
Practical ASP |
Ivan Bayross |
005.7 / B A Y |
2013 |
|
WEB TECHNOLOGIES: TCP/IP, JAVA Programming, and Cloud Computing |
Achyut Godbole
Atul Kahate |
006.7 / G O D |
2013 |
|
J2ME: The complete reference |
James Keogh |
005.133 / k e o |
2014 |
|
Asia-Pacific between Conflict and Reconciliation |
|
320.95/A S I |
2016 |
|
International Curriculum For Chinese Language Education |
|
495.1/I N T |
2014 |
|
The Political Role Of Palestinian Women in the 1930s |
Faiha Abdulhadi |
305.4209564/A B D |
2015 |
|
Voices of Palestinian women : a 2009 report on Israels human rights violations against Palestinian women |
|
323.34/V O I |
2009 |
|
Sleepless in Gaza Israeli drone war on the Gaza strip |
Atef Abu Saif |
327.12/A B U |
2014 |
|
war crimes against children |
|
364.15 / w a r |
2009 |
|
Beyond De Linking : Development by popular protection vs. Development by stats |
Adel Samara |
338.9564/S A M |
2005 |
|
Annotated Bibliography Selected Material On Jerusalem 1995-2001 |
|
015.564/A N N |
2002 |
|
Report on Palestinian women perception of protection |
|
362.83/R E P |
2009 |
|
Ascd Lexicon of Learning |
|
R/370.3/A |
2007 |
|
Policies to promote female entrepreneurship In the Palestinian territory |
Tareq Sadeq
Muhannad Hamed
Steven Glover |
338.04082/S A D |
2011 |
|
A DICTIONARY OF APPLIED LINGUISTICS : ENGLISH_ ARABIC |
AL KHULI k MUHAMMAD |
R / 423.1 / K H U |
1986 |
|
The Palestinian Refugees Tragedy and Loss |
Adnan Abdelrazek |
325.2/A B D |
2022 |
|
Marketing Arab and Foreign Perspectives |
Naeim Hafez Abougomaah |
658.8/A B O |
2006 |
|
Data Structures |
Usha Agrawal |
005.73/A G R |
2019 |
|
Information Technology Class X |
Preeti Saxena
Suvigya Saxena |
005.7/S A X |
2021 |
|
Effective library systems and practices |
R.S Kochar |
023/K O C |
2018 |
|
Media and Protocol |
Gilane Hamza |
302.2/H A M |
2012 |
|
Security strategies in Windows platforms and applications |
Michael G Solomon |
005.8/S O L |
2021 |
|
Deep learning with Python : learn best practices of deep learning models with PyTorch |
Nikhil Ketkar
Jojo Moolayil |
005.133/K E T |
2021 |
|
Applied cryptography in .NET and Azure Key Vault : a practical guide to encryption in .NET and .NET Core |
Stephen Haunts |
003.54/H A U |
2019 |
|
Introduction to Algorithms for Data Mining and Machine Learning |
Xin-She Yang |
006.312/Y A N |
2019 |