مكتبة الشهيد خالد الحسن

نتائج البحث عن:

اسم الكتاب المؤلف رمز التصنيف سنة النشر
war crimes against children 364.15 / w a r
Beyond De Linking : Development by popular protection vs. Development by stats 338.9564/S A M
Sexual Violence Against Female Teenagers in The West Bank: From a Gender perspective 362.8/A L R
Annotated Bibliography Selected Material On Jerusalem 1995-2001 015.564/A N N
Report on Palestinian women perception of protection 362.83/R E P
Ten steps to improving college reading skills 428.40711/L A N
Policies to promote female entrepreneurship In the Palestinian territory 338.04082/S A D
The Palestinian Refugees Tragedy and Loss 325.2/A B D
Cybercrime and Information technology : theory and practice -the computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices 364.168/A L E
Doing academic research : a practical guide to research methods and analysis 001.4/G O U
The psychology of terrorism 303.625/S H O
Marketing Arab and Foreign Perspectives 658.8/A B O
Data Structures 005.73/A G R
Big data and the computable society : algorithms and people in the digital world 005.7/T A L
Alice & Bob learn application security 005.3/J A N
Effective library systems and practices 023/K O C
MDM : Fundamentals, Security, and the Modern Desktop : Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10 621.382/M O S
Electronic Government For The 21st Century A Practice Field Revisited 352.3802/A L K
Media and Protocol 302.2/H A M
The public relations handbook 659.2/P U B
Data science at the command line : obtain, scrub, explore, and model data with Unix power tools 005.7/J A N
Design patterns for cloud native applications : patterns in practice using APIs, data, events, and streams 004.6782/I N D
Security strategies in Windows platforms and applications 005.8/S O L
Cryptography and network security 005.82/A L E
Web Application Security : exploitation and countermeasures for modern web applications 005.8/H O F
Learning PHP, MySQL & JavaScript a step-by-step guide to creating dynamic websites 005.2762/N I X
Deep learning with Python : learn best practices of deep learning models with PyTorch 005.133/K E T
Big data and machine learning in quantitative investment 332.60285631/G U I
Embedded system design : embedded systems foundations of cyber-physical systems 621.3815/M A R
Applied cryptography in .NET and Azure Key Vault : a practical guide to encryption in .NET and .NET Core 003.54/H A U
الحقوق محفوظة مكتبة الشهيد خالد الحسن © 2007-2026