![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
BRIXMIS (British Commander-in-Chief's Mission to the Group Soviet Forces of Occupation in Germany) is one of the most covert elite units of the British Army. They were dropped in behind 'enemy lines' ten months after the Second World War had ended and continued with their intelligence-gathering missions until the fall of the Berlin Wall in November 1989. During this period Berlin was a hotbed of spying between East and West. BRIXMIS was established as a trusted channel of communication between the Red Army and the British Army on the Rhine. However, they acted in the shadows to steal advanced Soviet equipment and penetrate top-secret training areas. Here Steve Gibson offers a new understanding of the complex British role in the Cold War.
The most comprehensive history of Canadian military intelligence and its influence on key military operations Canadian intelligence has become increasingly central to the operations of the Canadian Armed Forces (CAF). Canadian Military Intelligence: Operations and Evolution from the October Crisis to the War in Afghanistan is the first comprehensive history that examines the impact of tactical, operational, and strategic intelligence on the Canadian military. Drawing upon a wide range of original documents and interviews with participants in specific operations, author David A. Charters provides an inside perspective on the development of military intelligence since the Second World War. He shows how intelligence influenced key military operations, from domestic internal security to peacekeeping efforts to high-intensity air campaigns-including the October Crisis of 1970, the Oka Crisis, the Gulf War, peacekeeping and enforcement operations in the Balkans, and the war in Afghanistan. He describes how decades of experience, innovation, and increasingly close cooperation with its Five Eyes and NATO allies allowed Canada's military intelligence to punch above its weight. Its tactical effectiveness and ability to overcome challenges reshaped the outlook of military commanders, and intelligence emerged from the margins to become a central feature of military and defense operations. Canadian Military Intelligence offers lessons from the past and critical implications for future intelligence support with the creation of the Canadian Forces Intelligence Command. This book will be essential to both intelligence history and military history readers and collections.
There are a limited number of intelligence analysis books available on the market. Intelligence Analysis Fundamentals is an introductory, accessible text for college level undergraduate and graduate level courses. While the principles outlined in the book largely follow military intelligence terminology and practice, concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles. Most of the existing texts on intelligence gathering and analysis focus on specific types of intelligence such as 'target centric' intelligence, and many of these, detail information from a position of prior knowledge. In other words, they are most valuable to the consumer who has a working-level knowledge of the subject. The book is general enough in nature that a lay student-interested in pursuing a career in intelligence, Homeland Security, or other related areas of law enforcement-will benefit from it. No prior knowledge of intelligence analysis, functions, or operations is assumed. Chapters illustrate methods and techniques that, over the years, have consistently demonstrate results, superior to those achieved with other means. Chapters describe such analytical methods that are most widely used in the intelligence community and serve as recognized standards and benchmarks in the practice of intelligence analysis. All techniques have been selected for inclusion for their specific application to homeland security, criminal investigations, and intelligence operations. Uses numerous hands-on activities-that can easily be modified by instructors to be more or less challenging depending on the course level-to reinforce concepts As current and active members of the intelligence community, the authors draw on their decades of experience in intelligence to offer real-world examples to illustrate concepts All methodologies reflect the latest trends in the intelligence communities assessment, analysis, and reporting processes with all presented being open source, non-classified information As such, the non-sensitive information presented is appropriate-and methods applicable-for use for education and training overseas and internationally Military-style collection and analysis methods are the primary ones presented, but all are directly correlated intelligence to current concepts, functions and practices within Homeland Security and the law communities Covers the counterterrorism environment where joint operations and investigative efforts combine military, private sector, and law enforcement action and information sharing The book will be a welcome addition to the body of literature available and a widely used reference for professionals and students alike.
The Cambridge Spies continue to fascinate - but one of them, John Cairncross, has always been more of an enigma than the others. He worked alone and was driven by his hostility to Fascism rather than to the promotion of Communism. During his war-time work at Bletchley Park, he passed documents to the Soviets which went on to influence the Battle of Kursk. Geoff Andrews gained exclusive access to the Cairncross papers and secrets, and has spoken to friends, relatives and former colleagues. In his portrait, a complex individual emerges – a scholar as well as a spy – whose motivations have often been misunderstood. After his resignation from the Civil Service, Cairncross moved to Italy and there he rebuilt his life as a foreign correspondent, editor and university professor. This gave him new circles and friendships – which included the writer Graham Greene – while he always lived with the fear that his earlier espionage would come to light. The full account of Cairncross's spying, his confession and his dramatic public exposure as the ‘fifth man’ is told here for the first time, unveiling the story of his post-espionage life.
Master of Deception is a biography of Peter Fleming, elder brother of Ian Fleming, creator of James Bond. Peter Fleming worked as a travel writer and journalist, serving with distinction throughout World War II and played a crucial role in British intelligence operations in the Far East. This biography ranges from the personal life of Fleming such as his marriage to Celia Johnson, a famous actor of the time, to his extensive military intelligence career which took him from Norway and Greece to the Far East. Framed through the life of Peter Fleming this book offers an in-depth study of British intelligence operations in the Far East during World War II.
This book is the first full history of South African intelligence and provides a detailed examination of the various stages in the evolution of South Africa's intelligence organizations and structures. Covering the apartheid period of 1948-90, the transition from apartheid to democracy of 1990-94, and the post-apartheid period of new intelligence dispensation from 1994-2005, this book examines not only the apartheid government's intelligence dispensation and operations, but also those of the African National Congress, and its partner, the South African Communist Party (ANC/SACP) - as well as those of other liberation movements and the 'independent homelands' under the apartheid system. Examining the civilian, military and police intelligence structures and operations in all periods, as well as the extraordinarily complicated apartheid government's security bureaucracy (or 'securocracy') and its structures and units, the book discusses how South Africa's Cold War 'position' influenced its relationships with various other world powers, especially where intelligence co-operation came to bear. It outlines South Africa's regional relationships and concerns - the foremost being its activities in South-West Africa (Namibia) and its relationship with Rhodesia through 1980. Finally, it examines the various legislative and other governance bases for the existence and operations of South Africa's intelligence structures - in all periods - and the influences that such activities as the Rivonia Trial (at one end of the history) or the Truth and Reconciliation Commission (at the other end) had on the evolution of these intelligence questions throughout South Africa's modern history. This book will be of great interest to all students of South African politics, intelligence studies and international politics in general.
Security intelligence continues to be of central importance to the contemporary world: individuals, organizations and states all seek timely and actionable intelligence in order to increase their sense of security. But what exactly is intelligence? Who seeks to develop it and to what ends? How can we ensure that intelligence is not abused? In this third edition of their classic text, Peter Gill and Mark Phythian set out a comprehensive framework for the study of intelligence, discussing how states organize the collection and analysis of information in order to produce intelligence, how it is acted upon, why it may fail and how the process should be governed in order to uphold democratic rights. Fully revised and updated throughout, the book covers recent developments, including the impact of the Snowden leaks on the role of intelligence agencies in Internet and social media surveillance and in defensive and offensive cyber operations, and the legal and political arrangements for democratic control. The role of intelligence as part of 'hybrid' warfare in the case of Russia and Ukraine is also explored, and the problems facing intelligence in the realm of counterterrorism is considered in the context of the recent wave of attacks in Western Europe. Intelligence in an Insecure World is an authoritative and accessible guide to a rapidly expanding area of inquiry - one that everyone has an interest in understanding.
The Cold War, which lasted from the end of the Second World War to the collapse of the Soviet Union in 1991, was fought mostly in the shadows, with the superpowers manoeuvring for strategic advantage in an anticipated global armed confrontation that thankfully never happened. How did the intelligence organisations of the major world powers go about their work? What advantages were they looking for? Did they succeed? By examining some of the famous, infamous, or lesser-known intelligence operations from both sides of the Iron Curtain, this book explains how the superpowers went about gathering intelligence on each other, examines the type of information they were looking for, what they did with it, and how it enabled them to stay one step ahead of the opposition. Possession of these secrets threatened a Third World War, but also helped keep the peace for more than four decades. With access to previously unreleased material, the author explores how the intelligence organisations, both civilian and military, took advantage of rapid developments in technology, and how they adapted to the changing threat. The book describes the epic scale of some of these operations, the surprising connections between them, and how they contributed to a complex multi-layered intelligence jigsaw which drove decision making at the highest level. On top of all the tradecraft, gadgets and cloak and dagger', the book also looks at the human side of espionage: their ideologies and motivations, the winners and losers, and the immense courage and frequent betrayal of those whose lives were touched by the Secrets of the Cold War.
Developing Intelligence Theory analyses the current state of intelligence theorisation, provides a guide to a range of approaches and perspectives, and points towards future research agendas in this field. Key questions discussed include the role of intelligence theory in organising the study of intelligence, how (and how far) explanations of intelligence have progressed in the last decade, and how intelligence theory should develop from here. Significant changes have occurred in the security intelligence environment in recent years-including transformative information technologies, the advent of 'new' terrorism, and the emergence of hybrid warfare-making this an opportune moment to take stock and consider how we explain what intelligence does and how. The material made available via the 2013 Edward Snowden leaks and subsequent national debates has contributed much to our understanding of contemporary intelligence processes and has significant implications for future theorisation, for example, in relation to the concept of 'surveillance'. The contributors are leading figures in Intelligence Studies who represent a range of different approaches to conceptual thinking about intelligence. As such, their contributions provide a clear statement of the current parameters of debates in intelligence theory, while also pointing to ways in which the study of intelligence continues to develop. This book was originally published as a special issue of Intelligence and National Security.
This book discusses the application of hypothesis testing to the practice of intelligence analysis. By drawing on longstanding procedures of scientific method, particularly hypothesis testing, this book strongly critiques standard intelligence analytic practices. It shows these practices to be inadequate, as they are illogical in terms of what formal philosophy says any intelligence analysts can realistically be expected to know, and for the future when analysts will face pressures to adapt to digital age modeling techniques. The methodology focuses on identifying and remedying analytic errors caused by analyst cognitive biases and by foreign denial and deception. To demonstrate that it is a practical tool, it walks analysts through a case study, step by step, to show how its hypothesis testing can be implemented. It also invites a comparative test in the real world with any other intelligence methodologies to assess its strengths and weaknesses in predicting the outcome of an actual "live" intelligence issue. This book will be of much interest to students of intelligence studies, public policy and national security, as well as practitioners.
This is the first major study based on Soviet documents and revelations of the Soviet state security during the period 1939-1953--a period about which relatively little is known. The book documents the role of Stalin and the major players in massive crimes carried out during this period against the Soviet people. It also provides the first detailed biography of V. S. Abakumov, Minister of State Security, 1946-1951. Based on Glasnost revelations and recently released archival material, this study covers the operations of Soviet state security from Beriia's appointment in 1938 until Stalin's death. The book pays particular attention to the career of V. S. Abakumov, head of SMERSH counterintelligence during the war and minister in charge of the MGB (the predecessor of the KGB) from 1946 until his removal and arrest in July 1951. The author argues that terror remained the central feature of Stalin's rule even after the Great Terror and he provides examples of how he micromanaged the repressions. The book catalogs the major crimes committed by the security organs and the leading perpetrators and provides evidence that the crimes were similar to those for which the Nazi leaders were punished after the war. Subjects covered include Katyn and its aftermath, the arrest and execution of senior military officers, the killing of political prisoners near Orel in September 1941, and the deportations of various nationalities during the war. The post-war period saw the Aviator and Leningrad affairs as well as the anti-cosmopolitan campaign whose target was mainly Jewish intellectuals. Later chapters cover AbakumoV's downfall, the hatching of the Mingrelian and Doctors plots and the events that followed Stalin's death. Finally, there are chapters on the fate of those who ran Stalin's machinery of terror in the last 13 years of his rule. These and other topics will be of concern to all students and scholars of Soviet history and those interested in secret police and intelligence operations.
'One of the biggest intelligence coups in recent years' The Times For years KGB operative Vasili Mitrokhin risked his life hiding top-secret material from Russian secret service archives beneath his family dacha. When he was exfiltrated to the West he took with him what the FBI called 'the most complete and extensive intelligence ever received from any source'. This extraordinary bestselling book is the result. 'Co-authored in a brilliant partnership by Christopher Andrew and the renegade Soviet archivist himself ... This is a truly global expose of major KGB penetrations throughout the Western world' The Times 'This tale of malevolent spymasters, intricate tradecraft and cold-eyed betrayal reads like a cold war novel' Time 'Sensational ... the most informed and detailed study of Soviet subversive intrigues worldwide' Spectator 'The most comprehensive addition to the subject ever published' Sunday Telegraph
During the Second World War, the only way Winston Churchill and his American counterpart Franklin D. Roosevelt could communicate was via a top secret transatlantic telephone link. All other Atlantic telephone cables had been disconnected to prevent the Germans intercepting information. Ruth Ive, then a young stenographer working in the Ministry of Information, had the job of censoring the line, and she spent the rest of the war listening in to the conversations across the Atlantic, ready to cut the line if anything was said that might compromise security. Ruth was sworn to secrecy about her work, and at the end of the war all documentation proving the existence of the telephone line was destroyed. It was not until 1995, when Churchill's private files were finally declassified, that Ruth was able to research her story. Now, for the first time, one of the Second World War's key workers describes the details of her incredible story, and the private conversations of two of the war's most important players can be revealed.
The world's fastest growing continent demographically, Africa displays nearly all the features of today's global security challenges: armed conflict, terrorism, irregular migration, organized crime, great power competition, public discontent, and economic turbulence. John Siko and Jonah Victor present their lessons from professional practice and pedagogical approach from the classroom in a concise guidebook that leads students and professionals through the most important issues, dynamics, challenges, and considerations for analysing and planning responses to security developments in Africa. This book provides issue-by-issue primers on the causes and consequences of Africa's security challenges that include: -how to anticipate security problems across current political and economic events -how to analyse African security institutions and military capabilities -how to understand historical trends across the African continent and appreciate unique variations among countries. -how to identify key drivers of future trends -how to connect security analysis to policy planning Learning is supported through the following features: - Thematic chapters which are optimized to help the reader quickly connect to the key concepts and analytic frameworks within the field. - The most relevant historical case studies, enabling students to engage in sophisticated analysis and discussion. - Connections and contrasts between the situations in North Africa and sub-Saharan Africa, which are traditionally studied separately. - Special sections on understanding race and ethnicity, and advice on traveling in Africa. - Chapter-end checklists of key questions to enable practical engagement with the topics covered.
Britain's war in the shadows of male spies and subterfuge in the heart of occupied France is a story well known, but what of the women who also risked their lives for Britain and the liberation of France? In 1942 a desperate need for new recruits, saw SOE turn to a previously overlooked group - women. These extraordinary women came from different backgrounds, but were joined in their idealistic love of France and a desire to play a part in its liberation. They formed SOE's F Section. From the famous White Mouse, Nancy Wake, to the courageous, Noor Inayat Khan, they all risked their lives for King, Country and the Resistance. Many of them died bravely and painfully, and often those who survived, like Eileen Nearne, never told their stories, yet their secret missions of intelligence-gathering and sabotage undoubtedly helped the Resistance to drive out their occupiers and free France. Here, for the first time is the extraordinary account of all forty SOE F women agents. It is a story that deserves to be read by everyone. 'They were the war's bravest women, devoted to defeating the Nazis yet reluctant ever to reveal their heroic pasts. Now a new book tells their intrepid tales.' Daily Express Squadron Leader BERYL E. ESCOTT served in the RAF and is one of the foremost experts on the women of SOE.
Of German stock dating back to 1530 in Saxony, Eric George Ackermann GM was born on the Isle of Wight in 1919 and became a leading figure in the world of signals and electronic intelligence. As a Junior Scientific Officer at the Telecommunication Research Establishment, Boscombe Down, with an honorary commission in the Royal Air Force, he made numerous flights over occupied territory searching for, monitoring and destroying Germany's Wuerzburg, Knickebein and X Band radar systems. Much of his research was passed to the highest levels of wartime government, and was highly prized, ensuring that tactical plans could be executed that took full advantage of known, top secret German intelligence. A host of secret missions to assess the enemy's radar capabilities were carried out in North Africa, Gibraltar and Italy. This new and engaging biography explores the various highs and lows of his operational deployment at the vanguard of tactical intelligence operations in these exciting theaters of war. Winner of the George Medal for conspicuous gallantry, his efforts weren't confined to the offices of war. He saw conflict up close and personal, and was therefore aware of the urgency of his endeavours, and the extent to which his findings made a difference. The end of the war was a cause of great celebration, but it did not signal the end of Ackermann's role, far from it. He was to play a major part in the setting up and implementation of a string of listening stations built along the borders of Soviet Bloc countries which were destined to glean a wealth of invaluable post-war intelligence. Further work in aeronautics and satellite construction in the States followed, meaning the reach of Ackermann's influence could be allowed to stretch yet further. Yet despite the might and scale of his achievement, he has never before been the subject of a book-length study. The authors, Peter Jackson and David Haysom, have made every effort to rectify that in this new publication which is sure to appeal to aviation enthusiasts, as well as the more general reader curious to gain new insights into twentieth century intelligence practices and their often far-reaching consequences.
Cover Name: Dr. Rantzau is a gripping diary-like personal account of espionage during the Second World War and is one of very few historic memoirs written by an ex- Abwehr officer. Detailed is how Colonel Nikolaus Ritter, following a brief World War I career and over ten years as a businessman in America, returned to Germany in spring of 1935 and became Chief of Air Intelligence in the Abwehr. He was assigned to establish a network of agents to gather information on British and US airfields, aircrafts, and state-of-the-art developments in the aerospace industry. Among others, Ritter's cover names were Dr. Rantzau and Dr. Reinhard in Holland, Belgium, and Luxembourg, Dr. Jansen in Hungary, Dr. Renken in Germany, and Mr. Johnson in America. Throughout his service in the Abwehr, Ritter smuggled America's most jealously guarded secret, the Norden bombsight and the Sperry gyroscope, into Germany, and coordinated the planning for the invasion of the British Isles (Operation Sea Lion). Ritter was incarcerated by the British in 1945 and sent to the Bad Nenndorf interrogation centre. Katharine Ritter Wallace, the daughter of Col. Ritter, presents the first English translation of the German World War II memoir. With a combination of collected documents, correspondences, personal notes, communications with peers, and from memory, this captivating account by an espionage agent reveals an insider's glimpse of the German intelligence service and of a handler's expansive and diverse agent network.
Many aspects of the Tet offensive of 1968 are brought to light here. The offensive is acknowledged as the turning point of the Vietnam War. Using Communist Vietnamese documents combined with Western sources, the author provides a more accurate version of the events, their significance, and reveals the crucial role played by US intelligence. This book illustrates that in the 1960s the Communist Vietnamese were well aware of the political and diplomatic nature of a People's War.
Students and enthusiasts of American history are familiar with the Revolutionary War spies Nathan Hale and Benedict Arnold, but few studies have closely examined the wider intelligence efforts that enabled the colonies to gain their independence. Spies, Patriots, and Traitors provides readers with a fascinating, well-documented, and highly readable account of American intelligence activities during the era of the Revolutionary War, from 1765 to 1783, while describing the intelligence sources and methods used and how our Founding Fathers learned and practiced their intelligence role. The author, a retired CIA officer, provides insights into these events from an intelligence professional's perspective, highlighting the tradecraft of intelligence collection, counterintelligence, and covert actions and relating how many of the principles of the era's intelligence practice are still relevant today. Kenneth A. Daigler reveals the intelligence activities of famous personalities such as Samuel Adams, George Washington, Benjamin Franklin, Nathan Hale, John Jay, and Benedict Arnold, as well as many less well-known figures. He examines the important role of intelligence in key theaters of military operations, such as Massachusetts, New York, New Jersey, Pennsylvania, and in General Nathanael Greene's campaign in South Carolina; the role of African Americans in the era's intelligence activities; undertakings of networks such as the Culper Ring; and intelligence efforts and paramilitary actions conducted abroad. Spies, Patriots, and Traitors adds a new dimension to our understanding of the American Revolution. The book's scrutiny of the tradecraft and management of Revolutionary War intelligence activities will be of interest to students, scholars, intelligence professionals, and anyone who wants to learn more about this fascinating era of American history.
The world of intelligence has been completely transformed by the end of the Cold War and the onset of an age of information. Prior to the 1990s, US government intelligence had one principal target, the Soviet Union; a narrow set of 'customers', the political and military officials of the US government; and a limited set of information from the sources they owned, spy satellites and spies. Today, world intelligence has many targets, numerous consumers - not all of whom are American or in the government - and too much information, most of which is not owned by the U.S. government and is of widely varying reliability. In this bold and penetrating study, Gregory Treverton, former Vice Chair of the National Intelligence Council and Senate investigator, offers his insider's views on how intelligence gathering and analysis must change. He suggests why intelligence needs to be both contrarian, leaning against the conventional wisdom, and attentive to the longer term, leaning against the growing shorter time horizons of Washington policy makers. He urges that the solving of intelligence puzzles tap expertise outside government - in the academy, think tanks, and Wall Street - to make these parties colleagues and co-consumers of intelligence, befitting the changed role of government from doer to convener, mediator, and coalition-builder.
The official book behind the Academy Award-winning film The Imitation Game, starring Benedict Cumberbatch and Keira Knightley Alan Turing was the mathematician whose cipher-cracking transformed the Second World War. Taken on by British Intelligence in 1938, as a shy young Cambridge don, he combined brilliant logic with a flair for engineering. In 1940 his machines were breaking the Enigma-enciphered messages of Nazi Germany's air force. He then headed the penetration of the super-secure U-boat communications. But his vision went far beyond this achievement. Before the war he had invented the concept of the universal machine, and in 1945 he turned this into the first design for a digital computer. Turing's far-sighted plans for the digital era forged ahead into a vision for Artificial Intelligence. However, in 1952 his homosexuality rendered him a criminal and he was subjected to humiliating treatment. In 1954, aged 41, Alan Turing took his own life.
This volume explores the contemporary challenges to US national cybersecurity. Taking stock of the field, it features contributions by leading experts working at the intersection between academia and government and offers a unique overview of some of the latest debates about national cybersecurity. These contributions showcase the diversity of approaches and issues shaping contemporary understandings of cybersecurity in the West, such as deterrence and governance, cyber intelligence and big data, international cooperation, and public-private collaboration. The volume's main contribution lies in its effort to settle the field around three main themes exploring the international politics, concepts, and organization of contemporary cybersecurity from a US perspective. Related to these themes, this volume pinpoints three pressing challenges US decision makers and their allies currently face as they attempt to govern cyberspace: maintaining international order, solving conceptual puzzles to harness the modern information environment, and coordinating the efforts of diverse partners. The volume will be of much interest to students of cybersecurity, defense studies, strategic studies, security studies, and IR in general.
Learning from history helps states to create foreign and security policy that builds upon successes and avoids past mistakes. Louise Kettle's insightful analysis - drawing on a wealth of previously unseen documents, sourced by Freedom of Information requests, together with interviews with government and intelligence agency officials - questions whether the British government actually learns from history. This is achieved through an extended commentary on military interventions in the Middle East since the 1950s, including a behind-the-scenes glimpse into Whitehall decision-making and a critical examination of the 2016 Iraq Inquiry report.
‘One of our very best writers on France.’ Antony Beevor After publishing an acclaimed biography of Jean Moulin, leader of the French Resistance, Patrick Marnham received an anonymous letter from a person who claimed to have worked for British Intelligence during the war. The ex-spy praised his book but insisted that he had missed the real ‘treasure’. The letter drew Marnham back to the early 1960s when he had been taught French by a mercurial woman – a former Resistance leader, whose SOE network was broken on the same day that Moulin was captured and who endured eighteen months in Ravensbrück concentration camp. Could these two events have been connected? His anonymous correspondent offered a tantalising set of clues that seemed to implicate Churchill and British Intelligence in the catastrophe. Drawing on a deep knowledge of France and original research in British and French archives, War in the Shadows exposes the ruthless double-dealing of the Allied intelligence services and the Gestapo through one of the darkest periods of the Second World War. It is a story worthy of Le Carré, but with this difference – it is not fiction. ‘A melange of Le Grand Meaulnes and The Spy Who Came in from the Cold. It is unforgettable.’ Ferdinand Mount, TLS, Books of the Year ‘A masterly analysis, impeccably presented.’ Allan Mallinson, Spectator ‘Fascinating… Marnham has a vast and scholarly knowledge of this often treacherous world.’ Caroline Moorehead, Literary Review |
![]() ![]() You may like...
Hill Walking Essentials - Skills and…
British Mountaineering Council, Mountaineering Council Of Scotland, …
DVD
Theory of Bergman Spaces
Hakan Hedenmalm, Boris Korenblum, …
Hardcover
R1,662
Discovery Miles 16 620
Contemporary Issues in Human Resource…
C. Brewster, P. Holland, …
Paperback
![]() R693 Discovery Miles 6 930
|