|
WEB TECHNOLOGIES: TCP/IP, JAVA Programming, and Cloud Computing |
Achyut Godbole
Atul Kahate |
006.7 / G O D |
2013 |
|
J2ME: The complete reference |
James Keogh |
005.133 / k e o |
2014 |
|
Asia-Pacific between Conflict and Reconciliation |
|
320.95/A S I |
2016 |
|
International Curriculum For Chinese Language Education |
|
495.1/I N T |
2014 |
|
The Political Role Of Palestinian Women in the 1930s |
Faiha Abdulhadi |
305.4209564/A B D |
2015 |
|
Voices of Palestinian women : a 2009 report on Israels human rights violations against Palestinian women |
|
323.34/V O I |
2009 |
|
Sleepless in Gaza Israeli drone war on the Gaza strip |
Atef Abu Saif |
327.12/A B U |
2014 |
|
war crimes against children |
|
364.15 / w a r |
2009 |
|
Beyond De Linking : Development by popular protection vs. Development by stats |
Adel Samara |
338.9564/S A M |
2005 |
|
Annotated Bibliography Selected Material On Jerusalem 1995-2001 |
|
015.564/A N N |
2002 |
|
Report on Palestinian women perception of protection |
|
362.83/R E P |
2009 |
|
Ascd Lexicon of Learning |
|
R/370.3/A |
2007 |
|
Policies to promote female entrepreneurship In the Palestinian territory |
Tareq Sadeq
Muhannad Hamed
Steven Glover |
338.04082/S A D |
2011 |
|
A DICTIONARY OF APPLIED LINGUISTICS : ENGLISH_ ARABIC |
AL KHULI k MUHAMMAD |
R / 423.1 / K H U |
1986 |
|
The Palestinian Refugees Tragedy and Loss |
Adnan Abdelrazek |
325.2/A B D |
2022 |
|
Marketing Arab and Foreign Perspectives |
Naeim Hafez Abougomaah |
658.8/A B O |
2006 |
|
Data Structures |
Usha Agrawal |
005.73/A G R |
2019 |
|
Information Technology Class X |
Preeti Saxena
Suvigya Saxena |
005.7/S A X |
2021 |
|
Effective library systems and practices |
R.S Kochar |
023/K O C |
2018 |
|
Media and Protocol |
Gilane Hamza |
302.2/H A M |
2012 |
|
Security strategies in Windows platforms and applications |
Michael G Solomon |
005.8/S O L |
2021 |
|
Deep learning with Python : learn best practices of deep learning models with PyTorch |
Nikhil Ketkar
Jojo Moolayil |
005.133/K E T |
2021 |
|
Applied cryptography in .NET and Azure Key Vault : a practical guide to encryption in .NET and .NET Core |
Stephen Haunts |
003.54/H A U |
2019 |
|
Introduction to Algorithms for Data Mining and Machine Learning |
Xin-She Yang |
006.312/Y A N |
2019 |
|
Big Data Concepts Technology And Architecture |
|
005.7/B I G |
2022 |
|
Big Data Analytics |
Raj Kamal
Preeti Saxena |
005.7/K A M |
2019 |
|
The Holy Bible : Containing the Old and New Testaments |
|
R/298.2/T H E |
1978 |
|
The Ethics of Management |
Larue Tone Hosmer |
174.4/H O S |
1997 |
|
Concise history of western music |
Barbara Russanp Hanning |
780.9/H A N |
2006 |
|
سبل زيادة حصة المنتجات المحلية في الأسواق المحلية والخارجية |
ابراهيم هنطش |
338.9564/ه ن ط |
2012 |