|   | Policies to promote female entrepreneurship In the Palestinian territory | Tareq Sadeq 
Muhannad Hamed 
Steven Glover | 338.04082/S A D | 2011 | 
		|   | A DICTIONARY OF APPLIED LINGUISTICS : ENGLISH_ ARABIC | AL KHULI k MUHAMMAD | R / 423.1 / K H U | 1986 | 
		|   | The Palestinian Refugees Tragedy and Loss | Adnan Abdelrazek | 325.2/A B D | 2022 | 
		|   | Marketing Arab and Foreign Perspectives | Naeim Hafez Abougomaah | 658.8/A B O | 2006 | 
		|   | Data Structures | Usha Agrawal | 005.73/A G R | 2019 | 
		|   | Information Technology Class X | Preeti Saxena 
Suvigya Saxena | 005.7/S A X | 2021 | 
		|   | Effective library systems and practices | R.S Kochar | 023/K O C | 2018 | 
		|   | Media and Protocol | Gilane Hamza | 302.2/H A M | 2012 | 
		|   | Security strategies in Windows platforms and applications | Michael G Solomon | 005.8/S O L | 2021 | 
		|   | Deep learning with Python : learn best practices of deep learning models with PyTorch | Nikhil Ketkar 
Jojo Moolayil | 005.133/K E T | 2021 | 
		|   | Applied cryptography in .NET and Azure Key Vault : a practical guide to encryption in .NET and .NET Core | Stephen Haunts | 003.54/H A U | 2019 | 
		|   | Introduction to Algorithms for Data Mining and Machine Learning | Xin-She Yang | 006.312/Y A N | 2019 | 
		|   | Big Data Concepts Technology And Architecture |  | 005.7/B I G | 2022 | 
		|   | Big Data Analytics | Raj Kamal 
Preeti Saxena | 005.7/K A M | 2019 | 
		|   | The Holy Bible : Containing the Old and New Testaments |  | R/298.2/T H E | 1978 | 
		|   | The Ethics of Management | Larue Tone Hosmer | 174.4/H O S | 1997 | 
		|   | Concise history of western music | Barbara Russanp Hanning | 780.9/H A N | 2006 | 
		|   | سبل زيادة حصة المنتجات المحلية في الأسواق المحلية والخارجية | ابراهيم هنطش | 338.9564/ه ن ط | 2012 | 
		|   | An Introduction To Business Ethics | Joseph Desjardins | 174.4/D E S | 2009 | 
		|   | A dictionary of theoretical linguistics: English-Arabic, with and Arabic-English glassary | Muhammad Ali Khuli | R/423.1/K H U | 1982 | 
		|   | ?What about deterrence in an era of cyberwar | Peter W. Singer 
 Allan Friedman |  | 2014 | 
		|   | Learn cyber conflict history, or doom yourself to repeat it | Jason Healey |  | 2013 | 
		|   | ?How can we better prepare for cyber incidents | Peter W. Singer 
 Allan Friedman |  | 2014 | 
		|   | ?Cyberspace: What is it, where is it and who cares | Brett Williams |  | 2014 | 
		|   | Are we winning? | Split NSA and CyberCom | Civil-military tension |  |  | 2013 | 
		|   | The Complete Cyber Security Course VolumeI  HACKERS Exposed | Nathan House |  | 2017 | 
		|   | INTERNET OF THINGS (IoT) Technologies, Applications,  Challenges, and Solutions |  |  | 2018 | 
		|   | Sense and Sensibility | Jane Austen | F/A U S | 2007 | 
		|   | Children, Adolescents, and Advertising |  |  | 2006 | 
		|   | Children and Video Games |  |  | 2002 |