SEARCH_RESULTS:

BOOK_NAME AUTHOR CLASS_CODE YOFP
iPhone and iPad App: 24_ Hour Trainer 004.16 / M I S
Project Management: a systems approach to planning, scheduling, and controlling 658.4 / K E R
Lean six sigma for dummies 658.4 / M O R
Linux: The Complete Reference, Sixth Edition 005.43 / P E T
The Certified Six Sigma Green belt Handbook 658.4 / C E R
Java 6 and J2EE 1.5 (Java EE5) 005.133 / J A V
++Data structures using C and C 005.7 / L A N
Red Hat Linux Networking and system Administration 005.43 / C O L
++Obgect Oriented Programming with C 005.133 / B A L
software testing consepts and tools (winRunner, QTP, LoadRunner, and TestDirector) 005.13 / P U S
Android Application Development (with KitKat Support) 005.2 / K O T
Software requirements and Estimation 005.1 / K I S
SQL, PL/SQL the Programming Language of Oracle 005.133 / B A Y
Software quality engineering : Testing, quality assurance, and quantifiable improvement 005 / T I A
Microsoft® Windows server 2008: The complete Reference 005.4 / R U E
J2ME: The complete reference 005.133 / k e o
Internet communication technology for reconciliation : applied phronetic netnography in internet research methodologies 302.2/A L D
Asia-Pacific between Conflict and Reconciliation 320.95/A S I
International Curriculum For Chinese Language Education 495.1/I N T
The Political Role Of Palestinian Women in the 1930s 305.4209564/A B D
Voices of Palestinian women : a 2009 report on Israels human rights violations against Palestinian women 323.34/V O I
Sleepless in Gaza Israeli drone war on the Gaza strip 327.12/A B U
The Myth of Camp David or the distortion of the Palestinian narrative 956.94/B A U
war crimes against children 364.15 / w a r
Beyond De Linking : Development by popular protection vs. Development by stats 338.9564/S A M
Sexual Violence Against Female Teenagers in The West Bank: From a Gender perspective 362.8/A L R
Report on Palestinian women perception of protection 362.83/R E P
Ten steps to improving college reading skills 428.40711/L A N
Cybercrime and Information technology : theory and practice -the computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices 364.168/A L E
Doing academic research : a practical guide to research methods and analysis 001.4/G O U
COPYRIGHT © 2007-2026