Dinolt, George W., Lee A. Benzinge, and Mark G. Yatabe. Combining Components and Policies In
Computer Security Foundations Workshop VII. Los Alamitos, CA: Computer Society Press, IEEE Computer Society, 2004.
Angerman, William S.. Coming full circle with Boyd's OODA loop ideas: An analysis of innovation diffusion and evolution In
Department of the Air Force, Air Force Institute of Technology,Wright-Patterson Air Force Base. Ohio: Air University, 2004.
Hänggi, Heiner. "
Conceptualising Security Sector Reform and Reconstruction." In
Reform and Reconstruction of the Security Sector, edited by
Alan Bryden and
Heiner Hänggi, 3-18. Münster, Germany: Lit Verlag, 2004.
Cronin, Audrey Kurth. "
Conclusion: Toward an Effective Grand Strategy." In
Attacking Terrorism: Elements of a Grand Strategy, 293. Washington, D.C.: Georgetown University Press, 2004.
York, Steve. Confronting the Truth. United States Institute for Peace, 2004.
Zilmer-Johns, Lisbet. "
The Convention, the IGC and the Great Powers. The ESDP and the New Security Threats." In
The Politics of European Security, 55-82. Copenhagen: Danish Institute of Inter¬national Affairs, 2004.