Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Strategic Marketing Management

Buy
Strategic Marketing Management, 9780750659383 (0750659386), Routledge, 2005

This third edition of Strategic Marketing Management confirms it as the classic textbook on the subject. Its step- by- step approach provides comprehensive coverage of the five key strategic stages:

* Where are we now? - Strategic and marketing analysis
* Where do we want to be? - Strategic direction and strategy formulation
* How might we get there? - Strategic choice
* Which way is best? - Strategic evaluation
* How can we ensure arrival? - Strategic implementation and control

This new revised and updated third edition has completely new chapters on 'The Nature and Role of Competitive Advantage' and 'The Strategic Management of the Expanded Marketing Mix', and extensive new material covering:

* The changing role of marketing
* Approaches to analysing marketing capability
* E-marketing
* Branding
* Customer relationship management
* Relationship management myopia
* The decline of loyalty

The book retains the key features that make it essential reading for all those studying the management of marketing - a strong emphasis on implementation, up to date mini cases, and questions and summaries in each chapter to reinforce key points. Widely known as the most authoritative, successful and influential text in the sector, the new edition remains an irreplaceable resource for undergraduate and graduate students of business and marketing, and students of the CIM Diploma.

(HTML tags aren't allowed.)

Computational Intelligence and Pattern Analysis in Biology Informatics (Wiley Series in Bioinformatics)
Computational Intelligence and Pattern Analysis in Biology Informatics (Wiley Series in Bioinformatics)

An invaluable tool in Bioinformatics, this unique volume providesboth theoretical and experimental results, and describes basicprinciples of computational intelligence and pattern analysis whiledeepening the reader's understanding of the ways in which theseprinciples can be used for analyzing biological data in anefficient manner.

...
Oracle Database 10g XML & SQL: Design, Build & Manage XML Applications in Java, C, C++ & PL/SQL
Oracle Database 10g XML & SQL: Design, Build & Manage XML Applications in Java, C, C++ & PL/SQL

This comprehensive guide focuses on utilizing XML technologies within Oracle's XML-enabled products, with emphasis on XML standards, their usage and best practices.


Written by members of the Oracle XML group, this is a must-have reference for...

Manufacturing Processes for Advanced Composites
Manufacturing Processes for Advanced Composites
This book deals is intended for anyone wishing to learn more about the materials and manufacturing processes used to fabricate and assemble advanced composites. Although advanced composites can mean many different types of fibers in either polymer, metal or ceramic matrices, this book deals with the three main fibers (glass,...

Management of Infectious Compli- Cations in Cancer Patients
Management of Infectious Compli- Cations in Cancer Patients

Infection is a major cause of morbidity and mortality in patients with neoplastic disease because of compromised host defenses. These defects result in an increased risk of infection and its complications. The nature of the underlying malignancy, the immunodeficiencies associated with it, and the treatments directed against it are all...

Fundamentals of Audio and Video Programming for Games
Fundamentals of Audio and Video Programming for Games

Deliver console-rocking sound, music, and video effects to your games with this all-in-one toolkit for C++ game programmers. From mixing and moving sounds around a 3-D space to taking video to the third dimension, you get expert insights and performance tips direct from the developers. It’s everything you need to fuel your...

Embedded Java Security: Security for Mobile Devices
Embedded Java Security: Security for Mobile Devices
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy