by
Argenti, Paul A.
Table of contents http://catdir.loc.gov/catdir/enhancements/fy1215/2012024863-t.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1215/2012024863-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1215/2012024863-d.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1215/2012024863-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1215/2012024863-d.html
Format:
Books
Publication Date
2013
Excerpt:
Communication in management.
by
Swink, Morgan, 1959-
Format:
Books
Publication Date
2013
Excerpt:
The Irwin/McGraw-Hill series. Operations and decision sciences.
by
Cant, M. C. (Michael Colin), 1957- editor.
Format:
Books
Publication Date
2013
Excerpt:
Marketing management : a South African perspective / Cant, M. C. (Michael Colin), 1957- editor.
by
Shone, Anton, author.
Format:
Books
Publication Date
2013
Excerpt:
Successful event management : a practical handbook / Shone, Anton, author.
by
Monk, Ellen F.
Format:
Books
Publication Date
2013
Excerpt:
Management information systems.
by
Van Zyl, J.
Format:
Books
Publication Date
2012
Excerpt:
Business functions : an introduction / Van Zyl, J.
by
Wegner, Trevor.
Format:
Books
Publication Date
2012
Excerpt:
Applied business statistics : methods and Excel-based applications / Wegner, Trevor.
by
Bernard, Scott A., author.
Format:
Books
Publication Date
2012
Excerpt:
Information storage and retrieval systems -- Architecture.
by
Cornelissen, Joep.
Format:
Books
Publication Date
2011
Excerpt:
Corporate communication : a guide to theory and practice / Cornelissen, Joep.
by
Ngambi, Hellicy Chakosamoto.
Format:
Books
Publication Date
2011
Excerpt:
Management -- Moral and ethical aspects -- South Africa.
by
Strydom, J. W. (Johan Wilhelm), 1952-
Format:
Books
Publication Date
2011
Excerpt:
Principles of business management / Strydom, J. W. (Johan Wilhelm), 1952-
by
Wheeler, Evan.
Format:
Books
Publication Date
2011
Excerpt:
Security risk management : building an information security risk management program from the ground
Limit Search Results
Narrowed by:


