LEADER 03921nam 2200685 a 450 001 9910453194603321 005 20200520144314.0 010 $a1-281-92155-6 010 $a9786611921552 010 $a90-474-2095-0 024 7 $a10.1163/ej.9789004158924.i-258 035 $a(CKB)1000000000552615 035 $a(EBL)468371 035 $a(OCoLC)629747347 035 $a(SSID)ssj0000197656 035 $a(PQKBManifestationID)11172314 035 $a(PQKBTitleCode)TC0000197656 035 $a(PQKBWorkID)10160331 035 $a(PQKB)10048455 035 $a(MiAaPQ)EBC468371 035 $a(OCoLC)167762107 035 $a(nllekb)BRILL9789047420958 035 $a(Au-PeEL)EBL468371 035 $a(CaPaEBR)ebr10271061 035 $a(CaONFJC)MIL192155 035 $a(PPN)170692248 035 $a(EXLCZ)991000000000552615 100 $a20071204d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aMapping the New Testament$b[electronic resource] $eearly Christian writings as a witness for Jewish biblical exegesis /$fby Serge Ruzer 210 $aLeiden ;$aBoston $cBrill$d2007 215 $a1 online resource (272 p.) 225 1 $aJewish and Christian perspectives series,$x1388-2074 ;$vv. 13 300 $aDescription based upon print version of record. 311 $a90-04-15892-8 320 $aIncludes bibliographical references and index. 327 $tPreliminary material /$rS. Ruzer -- $tIntroduction - The New Testament as witness for early jewish exegesis /$rS. Ruzer -- $tChapter One. Antitheses in Matthew 5: Midrashic aspects of exegetical techniques /$rS. Ruzer -- $tChapter Two. From \'love your neighbor\' to \'love your enemy\' /$rS. Ruzer -- $tChapter Three. The double love precept: Between Pharisees, Jesus and Qumran covenanters /$rS. Ruzer -- $tChapter Four. Who was unhappy with the Davidic Messiah? /$rS. Ruzer -- $tChapter Five. Negotiating the proper attitude to marriage and divorce /$rS. Ruzer -- $tChapter Six. The seat of sin and the limbs of Torah /$rS. Ruzer -- $tChapter Seven. Crucifixion: The search for a meaning vis-à-vis biblical prophecy. From Luke to Acts /$rS. Ruzer -- $tChapter Eight. The new covenant, the reinterpretation of scripture and collective messiahship /$rS. Ruzer -- $tConclusion and perspectives /$rS. Ruzer -- $tIndex of ancient sources /$rS. Ruzer. 330 $aThis volume discusses links between the exegetical trends current in various Second Temple Jewish circles and patterns of New Testament conversation with Jewish Scripture. The standard focus on Jewish background of Christianity is complemented here by an alternative direction: the ?mapping? of New Testament evidence as the early witness to more general trends attested in their fully developed form only later, in rabbinic literature. The question that dominates much of the discussion is: How can the New Testament be used for creating a fuller picture of Second Temple Jewish exegesis? The book deals with a representative variety of samples from different layers of the New Testament tradition: Synoptic Gospels, Pauline Epistles and Acts. 345 $aRuzer, Serge, 2018 410 0$aJewish and Christian perspectives series ;$vv. 13. 606 $aRabbinical literature$xRelation to the New Testament 606 $aChristianity and other religions$xJudaism 606 $aJudaism$xRelations$xChristianity 608 $aElectronic books. 615 0$aRabbinical literature$xRelation to the New Testament. 615 0$aChristianity and other religions$xJudaism. 615 0$aJudaism$xRelations$xChristianity. 676 $a225.6/7 700 $aRuzer$b Serge$0913985 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910453194603321 996 $aMapping the New Testament$92441693 997 $aUNINA LEADER 01950oam 2200469 450 001 9910707992703321 005 20170125105931.0 035 $a(CKB)5470000002468637 035 $a(OCoLC)922575404 035 $a(OCoLC)995470000002468637 035 $a(EXLCZ)995470000002468637 100 $a20150930d2015 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFederal information security, agencies need to correct weaknesses and fully implement security programs : report to congressional committees 210 1$aWashington, DC :$cUnited States Government Accountability Office,$d2015. 215 $a1 online resource (iv, 64 pages) $ccolor illustrations 300 $a"September 2015." 300 $a"GAO-15-714." 320 $aIncludes bibliographical references. 517 $aFederal information security, agencies need to correct weaknesses and fully implement security programs 606 $aAdministrative agencies$zUnited States$xRules and practice$xEvaluation 606 $aAdministrative agencies$xComputer networks$xSecurity measures$zUnited States 606 $aComputer security$zUnited States$xManagement$xEvaluation 606 $aData protection$zUnited States$xManagement$xEvaluation 615 0$aAdministrative agencies$xRules and practice$xEvaluation. 615 0$aAdministrative agencies$xComputer networks$xSecurity measures 615 0$aComputer security$xManagement$xEvaluation. 615 0$aData protection$xManagement$xEvaluation. 676 $a005.80973 801 0$bAWC 801 1$bAWC 801 2$bOCLCO 801 2$bB24X7 801 2$bGPO 906 $aBOOK 912 $a9910707992703321 996 $aFederal information security, agencies need to correct weaknesses and fully implement security programs : report to congressional committees$93266263 997 $aUNINA