Welcome to Midlands State University Library

View All e-Reserves



Browse all e-Reserves

bookcover
Management Accounting: Principles and Applications adopts a new and accessible approach to helping readers understand how management accounting contributes to decisions in a variety of organizational contexts. This book sets out clear explanations of practical management accounting techniques in the context of the application of these techniques to decisions. It...


bookcover
  • Author
Microfinance is a double bottom line sector which is growing fast, making money and doing well in a variety of socially interesting ways. The growth of its institutions requires good strategies, good control systems and informed decision-making, all of which require an appropriate Management Information System (MIS). While a good...

bookcover
  • Author
This book consists of various chapters which focus on the wider contexts of management innovation, entrepreneurship, and human resource management practices. Furthermore, the contributions are authored by scholars from all over the world, allowing the book to adopt a truly global perspective. Innovation is, without doubt, the foundation of economic...

bookcover
The only guarantee in business is change. All managers need to understand that they will either be buffeted by change or help shape it. Knowing how to do that is the real test of leadership in todays organizational environments. Managers Guide to Navigating Change provides methods for managing risks and...

bookcover
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as...

bookcover
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice...