|
war crimes against children |
|
364.15 / w a r |
2009 |
|
Beyond De Linking : Development by popular protection vs. Development by stats |
Adel Samara |
338.9564/S A M |
2005 |
|
Sexual Violence Against Female Teenagers in The West Bank: From a Gender perspective |
Ayesha Al-rafai |
362.8/A L R |
2007 |
|
Annotated Bibliography Selected Material On Jerusalem 1995-2001 |
|
015.564/A N N |
2002 |
|
Report on Palestinian women perception of protection |
|
362.83/R E P |
2009 |
|
Ten steps to improving college reading skills |
John Langan |
428.40711/L A N |
2008 |
|
Policies to promote female entrepreneurship In the Palestinian territory |
Tareq Sadeq
Muhannad Hamed
Steven Glover |
338.04082/S A D |
2011 |
|
The Palestinian Refugees Tragedy and Loss |
Adnan Abdelrazek |
325.2/A B D |
2022 |
|
Cybercrime and Information technology : theory and practice -the computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices |
Alex Alexander |
364.168/A L E |
2022 |
|
Doing academic research : a practical guide to research methods and analysis |
Ted Gournelos
Joshua Hammonds
Maridath Wilson |
001.4/G O U |
2019 |
|
The psychology of terrorism |
Neil Shortland |
303.625/S H O |
2021 |
|
Marketing Arab and Foreign Perspectives |
Naeim Hafez Abougomaah |
658.8/A B O |
2006 |
|
Data Structures |
Usha Agrawal |
005.73/A G R |
2019 |
|
Big data and the computable society : algorithms and people in the digital world |
Domenico Talia |
005.7/T A L |
2018 |
|
Alice & Bob learn application security |
Tanya Janca |
005.3/J A N |
2021 |
|
Effective library systems and practices |
R.S Kochar |
023/K O C |
2018 |
|
MDM : Fundamentals, Security, and the Modern Desktop : Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10 |
Jeremy Moskowitz |
621.382/M O S |
2019 |
|
Electronic Government For The 21st Century A Practice Field Revisited |
Ali M Al Khouri |
352.3802/A L K |
2018 |
|
Media and Protocol |
Gilane Hamza |
302.2/H A M |
2012 |
|
The public relations handbook |
|
659.2/P U B |
2021 |
|
Data science at the command line : obtain, scrub, explore, and model data with Unix power tools |
Jeroen Janssens |
005.7/J A N |
2021 |
|
Design patterns for cloud native applications : patterns in practice using APIs, data, events, and streams |
Kasun Indrasiri
Sriskandarajah Suhothayan |
004.6782/I N D |
2021 |
|
Security strategies in Windows platforms and applications |
Michael G Solomon |
005.8/S O L |
2021 |
|
Cryptography and network security |
Joseph Alexander |
005.82/A L E |
2022 |
|
Web Application Security : exploitation and countermeasures for modern web applications |
Andrew Hoffman |
005.8/H O F |
2020 |
|
Learning PHP, MySQL & JavaScript a step-by-step guide to creating dynamic websites |
Robin Nixon |
005.2762/N I X |
2021 |
|
Deep learning with Python : learn best practices of deep learning models with PyTorch |
Nikhil Ketkar
Jojo Moolayil |
005.133/K E T |
2021 |
|
Big data and machine learning in quantitative investment |
Tony Guida |
332.60285631/G U I |
2019 |
|
Embedded system design : embedded systems foundations of cyber-physical systems |
Peter Marwedel |
621.3815/M A R |
2006 |
|
Applied cryptography in .NET and Azure Key Vault : a practical guide to encryption in .NET and .NET Core |
Stephen Haunts |
003.54/H A U |
2019 |