|
++Obgect Oriented Programming with C |
E Balagurusamy |
005.133 / B A L |
2013 |
|
software testing consepts and tools (winRunner, QTP, LoadRunner, and TestDirector) |
Nageswara Rao Pusuluri |
005.13 / P U S |
2015 |
|
Android Application Development (with KitKat Support) |
Pradeep Kothari |
005.2 / K O T |
2015 |
|
Software requirements and Estimation |
Swapna Kishore
Rajesh Naik |
005.1 / K I S |
2014 |
|
SQL, PL/SQL the Programming Language of Oracle |
Ivan Bayross |
005.133 / B A Y |
2015 |
|
Software quality engineering : Testing, quality assurance, and quantifiable improvement |
Jeff Tian |
005 / T I A |
2014 |
|
Microsoft® Windows server 2008: The complete Reference |
Danielle Ruest
Nelson Ruest |
005.4 / R U E |
2014 |
|
J2ME: The complete reference |
James Keogh |
005.133 / k e o |
2014 |
|
Internet communication technology for reconciliation : applied phronetic netnography in internet research methodologies |
Iyad Muhsen Aldajani |
302.2/A L D |
2020 |
|
Asia-Pacific between Conflict and Reconciliation |
|
320.95/A S I |
2016 |
|
International Curriculum For Chinese Language Education |
|
495.1/I N T |
2014 |
|
The Political Role Of Palestinian Women in the 1930s |
Faiha Abdulhadi |
305.4209564/A B D |
2015 |
|
Voices of Palestinian women : a 2009 report on Israels human rights violations against Palestinian women |
|
323.34/V O I |
2009 |
|
Sleepless in Gaza Israeli drone war on the Gaza strip |
Atef Abu Saif |
327.12/A B U |
2014 |
|
The Myth of Camp David or the distortion of the Palestinian narrative |
Helga Baumgarten |
956.94/B A U |
2004 |
|
war crimes against children |
|
364.15 / w a r |
2009 |
|
Beyond De Linking : Development by popular protection vs. Development by stats |
Adel Samara |
338.9564/S A M |
2005 |
|
Sexual Violence Against Female Teenagers in The West Bank: From a Gender perspective |
Ayesha Al-rafai |
362.8/A L R |
2007 |
|
Report on Palestinian women perception of protection |
|
362.83/R E P |
2009 |
|
Ten steps to improving college reading skills |
John Langan |
428.40711/L A N |
2008 |
|
Cybercrime and Information technology : theory and practice -the computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices |
Alex Alexander |
364.168/A L E |
2022 |
|
Doing academic research : a practical guide to research methods and analysis |
Ted Gournelos
Joshua Hammonds
Maridath Wilson |
001.4/G O U |
2019 |
|
The psychology of terrorism |
Neil Shortland |
303.625/S H O |
2021 |
|
Data Structures |
Usha Agrawal |
005.73/A G R |
2019 |
|
Big data and the computable society : algorithms and people in the digital world |
Domenico Talia |
005.7/T A L |
2018 |
|
Alice & Bob learn application security |
Tanya Janca |
005.3/J A N |
2021 |
|
MDM : Fundamentals, Security, and the Modern Desktop : Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10 |
Jeremy Moskowitz |
621.382/M O S |
2019 |
|
Electronic Government For The 21st Century A Practice Field Revisited |
Ali M Al Khouri |
352.3802/A L K |
2018 |
|
Media and Protocol |
Gilane Hamza |
302.2/H A M |
2012 |
|
The public relations handbook |
|
659.2/P U B |
2021 |