by
Prinsloo, Frans.
Format:
Books
Publication Date
2013
Excerpt:
Integrated ethics -- Pre-engagement activities -- Planning -- Gathering of audit evidence
by
Prinsloo, Frans.
Format:
Books
Publication Date
2013
Excerpt:
further audit evidence -- Evaluating, concluding and reporting -- Internal controls -- Risk management and
by
Papadopoulos, Sylvia.
Format:
Books
Publication Date
2012
Excerpt:
Papadopoulos -- Electronic evidence / Larieka Meintjes-Van der Walt -- Cybercrime and the investigation of
by
Prinsloo, Frans.
Format:
Books
Publication Date
2012
Excerpt:
auditing evidence -- ch. 5 Evaluating, concluding and reporting -- ch. 6 Risk management -- ch. 7
by
Marx, B. (Benjamin), 1964-
Format:
Books
Publication Date
2011
Excerpt:
process and audit practice matters -- Responsibility in relation to fraud and error -- Audit evidence
by
Smith, Roger S. (Roger Shipley), 1953- author.
Format:
Books
Publication Date
2011
Excerpt:
, drift or lifestyle choice? -- Becoming criminal: what does the evidence tell us? -- Constructing crime
by
Patterson, James, 1947-
Format:
Books
Publication Date
2011
Excerpt:
shred of evidence: a cryptic message scrawled across the windshield in blood-red lipstick. The same
by
Bryman, Alan.
Format:
Books
Publication Date
2011
Excerpt:
leadership process : a review and assessment of theory and evidence / Leadership and organizational culture
by
Milkovich, George T.
Format:
Books
Publication Date
2011
Excerpt:
Structures -- Employee Contributions: Determining Individual Pay -- Pay-for-Performance: The Evidence -- Pay
by
Kleyn, D. G.
Format:
Books
Publication Date
2010
Excerpt:
procedure -- Law and the business world -- Law of evidence -- Courts and alternative dispute resolution
by
Patterson, James, 1947-
Format:
Books
Publication Date
2010
Excerpt:
the chaos, he accidentally captures a key piece of evidence that lands him in the middle of an all
by
Grant, Kevin, 1968-
Format:
Books
Publication Date
2010
Excerpt:
-- Introduction -- importance of ICT in contemporary organizations -- Evidence on the exploitation of ICT by
Limit Search Results
Narrowed by: