26 resultados para Chipman, John--1745-1761


Relevância:

20.00% 20.00%

Publicador:

Resumo:

http://www.archive.org/details/historyofcatholi00sheaiala

Relevância:

20.00% 20.00%

Publicador:

Resumo:

http://www.archive.org/details/jamesevans00maclrich

Relevância:

20.00% 20.00%

Publicador:

Resumo:

http://www.archive.org/details/womeninthemissio00telfuoft

Relevância:

20.00% 20.00%

Publicador:

Resumo:

http://www.archive.org/details/johnwesleytheman00pikeuoft

Relevância:

20.00% 20.00%

Publicador:

Resumo:

http://www.archive.org/details/bibleillustratio00ingluoft

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Throughout the history of the Church, the Epistle to the Hebrews has been one of the most puzzling letters in the Canon, particularly regarding the implications of understanding the person of Jesus Christ. John Chrysostom, an important patristic writer, is acknowledged to have made significant contributions to the exegesis of this letter. Chrysostom's thought became the norm for traditional thinking and interpretation of this letter in the Middle Ages. Martin Luther's reception of Chrysostom's Homilies on Hebrews presents a unique interpretation that some scholars may describe as the "Reformation Discovery" on Hebrews. In tracing Luther's reception and appropriation of Chrysostom's exegesis of the letter to the Hebrews, there is a noticeable and significant shift in Christological interpretation. Whether or not these modifications were necessary is a matter of debate; however, they do reflect Luther's contextual and existential questions regarding faith, Christ and knowledge of God, which is evident in his Lectures on Hebrews.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The TCP/IP architecture was originally designed without taking security measures into consideration. Over the years, it has been subjected to many attacks, which has led to many patches to counter them. Our investigations into the fundamental principles of networking have shown that carefully following an abstract model of Interprocess Communication (IPC) addresses many problems [1]. Guided by this IPC principle, we designed a clean-slate Recursive INternet Architecture (RINA) [2]. In this paper, we show how, without the aid of cryptographic techniques, the bare-bones architecture of RINA can resist most of the security attacks faced by TCP/IP. We also show how hard it is for an intruder to compromise RINA. Then, we show how RINA inherently supports security policies in a more manageable, on-demand basis, in contrast to the rigid, piecemeal approach of TCP/IP.