|   | Policies to promote female entrepreneurship In the Palestinian territory | Tareq Sadeq 
Muhannad Hamed 
Steven Glover | 338.04082/S A D | 2011 | 
		|   | The Palestinian Refugees Tragedy and Loss | Adnan Abdelrazek | 325.2/A B D | 2022 | 
		|   | Cybercrime and Information technology : theory and practice -the computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices | Alex Alexander | 364.168/A L E | 2022 | 
		|   | Doing academic research : a practical guide to research methods and analysis | Ted Gournelos 
Joshua Hammonds 
Maridath Wilson | 001.4/G O U | 2019 | 
		|   | The psychology of terrorism | Neil Shortland | 303.625/S H O | 2021 | 
		|   | Marketing Arab and Foreign Perspectives | Naeim Hafez Abougomaah | 658.8/A B O | 2006 | 
		|   | Data Structures | Usha Agrawal | 005.73/A G R | 2019 | 
		|   | Big data and the computable society : algorithms and people in the digital world | Domenico Talia | 005.7/T A L | 2018 | 
		|   | Alice & Bob learn application security | Tanya Janca | 005.3/J A N | 2021 | 
		|   | Effective library systems and practices | R.S Kochar | 023/K O C | 2018 | 
		|   | MDM : Fundamentals, Security, and the Modern Desktop : Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10 | Jeremy Moskowitz | 621.382/M O S | 2019 | 
		|   | Electronic Government For The 21st Century A Practice Field Revisited | Ali M Al Khouri | 352.3802/A L K | 2018 | 
		|   | Media and Protocol | Gilane Hamza | 302.2/H A M | 2012 | 
		|   | The public relations handbook |  | 659.2/P U B | 2021 | 
		|   | Data science at the command line : obtain, scrub, explore, and model data with Unix power tools | Jeroen Janssens | 005.7/J A N | 2021 | 
		|   | Design patterns for cloud native applications : patterns in practice using APIs, data, events, and streams | Kasun Indrasiri 
Sriskandarajah Suhothayan | 004.6782/I N D | 2021 | 
		|   | Security strategies in Windows platforms and applications | Michael G Solomon | 005.8/S O L | 2021 | 
		|   | Cryptography and network security | Joseph Alexander | 005.82/A L E | 2022 | 
		|   | Web Application Security : exploitation and countermeasures for modern web applications | Andrew Hoffman | 005.8/H O F | 2020 | 
		|   | Learning PHP, MySQL & JavaScript a step-by-step guide to creating dynamic websites | Robin Nixon | 005.2762/N I X | 2021 | 
		|   | Deep learning with Python : learn best practices of deep learning models with PyTorch | Nikhil Ketkar 
Jojo Moolayil | 005.133/K E T | 2021 | 
		|   | Big data and machine learning in quantitative investment | Tony Guida | 332.60285631/G U I | 2019 | 
		|   | Embedded system design : embedded systems foundations of cyber-physical systems | Peter Marwedel | 621.3815/M A R | 2006 | 
		|   | Applied cryptography in .NET and Azure Key Vault : a practical guide to encryption in .NET and .NET Core | Stephen Haunts | 003.54/H A U | 2019 | 
		|   | Introduction to Algorithms for Data Mining and Machine Learning | Xin-She Yang | 006.312/Y A N | 2019 | 
		|   | Hacking connected cars : tactics, techniques, and procedures | Alissa Knight | 629.046/K N I | 2020 | 
		|   | New Frontiers in Artificial Intelligence |  | 006.3/N E W | 2022 | 
		|   | Explainable Al with Python | Leonida Gianfagna 
Antonio Di Cecco | 005.133/G I A | No.Y | 
		|   | Cyber Security | Markus Mack | 005.8/M A C | 2021 | 
		|   | Cyber Laws Intellectual Property and E-Commerce Security | Michael Nash | 346.54048/N A S | 2021 |