Hänggi, Heiner. "
Conceptualising Security Sector Reform and Reconstruction." In
Reform and Reconstruction of the Security Sector, edited by
Alan Bryden and
Heiner Hänggi, 3-18. Münster, Germany: Lit Verlag, 2004.
Cronin, Audrey Kurth. "
Conclusion: Toward an Effective Grand Strategy." In
Attacking Terrorism: Elements of a Grand Strategy, 293. Washington, D.C.: Georgetown University Press, 2004.
York, Steve. Confronting the Truth. United States Institute for Peace, 2004.
Zilmer-Johns, Lisbet. "
The Convention, the IGC and the Great Powers. The ESDP and the New Security Threats." In
The Politics of European Security, 55-82. Copenhagen: Danish Institute of Inter¬national Affairs, 2004.
Jenkins, Brian Michael. "
Countering Al Qaeda." In
Defeating Terrorism: Shaping the New Security Environment. Guilford: CT: McGraw-Hill, 2004.
Jenkins, Brian Michael. "
Countering Al Qaeda." In
Defeating Terrorism: Shaping the New Security Environment. Guilford, CT: McGraw-Hill, 2004.
Lewis, Bernard. The Crisis of Islam . New York: Random House, 2004.
Cryptographic Randomized Response Techniques In
Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography. Singapore: Computer Science 2947, 2004.
Ambainis, Andris, Markus Jakobsson, and Helger Lipmaa. Cryptographic Randomized Response Techniques In
Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, Edited by
Feng Bao,
Robert H. Deng and
Jianying Zhou. Singapore: Computer Science 2947, 2004.