Palmer, A. (1998). Principles of evidence. Sydney: Cavendish Pub. Australia.
ISBN 9781876213060
Should you work as a professional or as an expert in any business or situation where you may be called upon to give advice or opinion it would do you well to read this book. There are strict rules to what evidence is: what is relevant, what is excluded, what is hearsay, what is opinion...
Other reading of related texts
Reference List / In-Text Citation Styles in APA 6th
Butler, D. A., Rodrick, S., McNamara, L., & Fitzgerald, A. (2007). Australian media law (Third edition). Sydney: Lawbook Co
Pearson, M. (2007). The journalist's guide to media law: Dealing with legal and ethical issues (Third ed.). Crows Nest, NSW: Allen & Unwin.
Davies, H., & Holdcroft, D. (1995). Jurisprudence: text and commentary. London: Butterworths.
Griggs, L., Iredale, I., & Clark, E. E. (Eds.) (2003). Managers and the law: A guide for business decision makers. Sydney: Lawbook Co.
Staunton, P. J., & Whyburn, B. (1997). Nursing and the law. Sydney: W.B. Saunders/Baillière Tindall, Harcourt Brace.
20190316
www.worldcat.org
Unless otherwise noted all books that are listed in my references were in my personal library at the time of the first blog posting about the book being reviewed.
Some titles were borrowed from RMIT University libraries during the period 2006-2016, or from Hobsons Bay City Council library at other times.
About this website and privacy
According to an update note I received from Google, web host of this blog, European Union (EU) laws require me, as author of this blog, to give EU visitors information about cookies used on this blog. In many cases, these laws may also require me, as author, or Google, as blog host, to obtain consent.
As a courtesy, I note that Google have added the following notice on this blog to help meet these regulations:
"This site uses cookies from Google to deliver its services and analyze traffic. Your IP address and user-agent are shared with Google along with performance and security metrics to ensure quality of service, generate usage statistics, and to detect and address abuse."
No comments:
Post a Comment