Collections Back
Found 749 from your keywords: Author : "EY"
You currently on page 25 of 25 page(s)
Query took 0.04373 second(s) to complete
 First Page   Previous   21   22   23   24   25 

Methodology and Design

Author(s) : Alison Mackey - Susan M. Gass -

Human Resource planning for Information Systems personnel - skills mixes and technological trends

Author(s) : Thomas A. Barocci, Kirtsen R. Wever and Richard A. Lahey -

High resolution forecasting for wind energy applications using Bayesian model averaging

Author(s) : JENNIFER F. COURTNEY*, PETER LYNCH and CONOR SWEENEY, -

Toward a Safer and More Secure Cyberspace

Author(s) : Seymour E. Goodman and Herbert S. Lin, Editors, Committee on Improving Cybersecurity Research in the -

Globalization, Trade and Poverty in Ghana

Author(s) : Charles Ackah and Ernest Aryeetey -

Entrepreneurship and Business History

Author(s) : Geoffrey Jones and R. Daniel Wadhwani -

The Role of Government in Corporate Governance

Author(s) : Cary Coglianese, Thomas J. Healey, Elizabeth K. Keating and Michael L. Michael -

Information Systems Foundations Theory, Representation and Reality

Author(s) : Dennis N. Hart and Shirley D. Gregor -

QUANTITATIVE INVESTMENT ANALYSIS WORKBOOK

Author(s) : Richard A. DeFusco, CFA Dennis W. McLeavey, CFA Jerald E. Pinto, CFA David E. Runkle, CFA -

PRINCIPLES AND PRACTICE OF STRESS MANAGEMENT

Author(s) : Paul M. Lehrer , Robert L. Woolfolk and Wesley E. Sime -

Farm Family Adaptations toSevere Economic Distress: Regional Summary

Author(s) : Paul Las ley and Jacqueline Fellows -

Managerial Auditing Journal

Author(s) : John A. Brierley, Hussein M. El-Nafabi and David R. Gwilliam -

Management Accounting for Decision Makers

Author(s) : Peter Atrill Eddie McLaney -

Electronic Commerce: The Strategic Perspective

Author(s) : Richard T. Watson, Pierre Berthon, Leyland F. Pitt, George M. Zinkhan -

Information Security

Author(s) : Mark Rhodes-Ousley -

A Guide to Risk Management

Author(s) : G. Bradley -

Financial Services Authority

Author(s) : Michael Ainley Ali Mashayekhi Robert Hicks Arshadur Rahman Ali Ravalia -

Fundamentals of Information Systems

Author(s) : Ralph M. Stair,George W. Reynolds -

Managing Information Security Risks: The OCTAVESM Approach

Author(s) : Christopher Alberts, Audrey Dorofee -

HTML5 Architecture

Author(s) : Wesley Hales -

A Legal Issues Primer

Author(s) : Richard Fontana and Bradley M. Kuhn -

Information Security Issues in a Digital Library Environment: A Literature Review

Author(s) : Audrey ANDAY*, Enrico FRANCESE*, Hugo C. HUURDEMAN*, Muharrem YILMAZ*, Dydimus ZENGENENE -

Introduction to Mineral Exploration

Author(s) : Charles J. Moon, Michael K.G. Whateley & Anthony M. Evans -

AAA Identity Management Security

Author(s) : Dr. Ilias Spais/ATC Jimmy McGibney/TSSG -
 First Page   Previous   21   22   23   24   25