LEADER 03483 am 22004093u 450 001 9910765711103321 005 20230808201759.0 010 $a9781928396000$b(ebook) 010 $a9780620723848$b(PDF ebook) 035 $a(CKB)3710000001092101 035 $a(EXLCZ)993710000001092101 100 $a20171009d2016uuuu fy| 0 101 0 $aafr 135 $aurm|#---uu||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPraktiese ekklesiologie ? Kerkwees in die 21ste eeu /$fWim A. Dreyer 210 1$aCape Town, South Africa :$cAOSIS,$d2016 210 4$dİ2016 215 $a1 online resource (xix, 230 pages) $cillustrations; digital, PDF file(s) 225 1 $aHTS Teologiese Studies/ Theological Studies :$vSupplementum 10 311 08$a062072384X 320 $aIncludes bibliographical references and index. 327 $aHoofstuk 1. Kerkwees: verleentheid of geleentheid --hoofstuk 2. Hermeneutiese perspektief op kerkwees --hoofstuk 3. Historiese perspektief op kerkwees --hoofstuk 4. Empiriese perspektief op kerkwees --hoofstuk 5. Strategiese perspektief op kerkwees --Literatuurverwysings --Indeks. 330 3 $aThe book proposes a radical transformation of existing church and training models in South African Reformed ecclesial circles. It takes the theological discussion, especially in ecclesiology, to the next level and argues for new ways to express belief in ecclesial practice. The book provides a provocative strategic vision which takes the ecclesial challenges of the twenty-first century seriously. The book will benefit not only theologians in the academy but also church leaders. Firstly, a situational analysis which focuses on the circumstances and social standing of mainstream churches in the twenty-first century, is done. Current difficulties and obstacles are identified. These can be contributed mainly to the secularisation and post-Christian tendencies of the era subsequent to the two world wars. Secondly, the responsible renewal of and much needed amendments to the structures of South African Protestant faith communities in a postmodern, postliberal, postcolonial context are proposed. The authority of scripture and the creeds of these churches are foundational for sensible renewal. The book dialogues with the relevant existing literature as it develops its ?missional? approach to being church in the world today. The investigation is thorough, the argumentation sound and the book makes an original and thought-provoking contribution to the field. The contribution includes biblical perspectives on ecclesial communities, a historical overview of the growth and decline of mainstream churches, insights with regard to the available empirical data, and strategies for the future. The work attests to sound methodology and a strong theoretical foundation. Literature from various parts of the world is utilised, which provides both breadth and depth to the work. The author displays an impressive ability to integrate findings from various fields and disciplines. 410 0$aHTS supplementum series$v10. 606 $aChristianity$zSouth Africa 606 $aChristian leadership 615 0$aChristianity 615 0$aChristian leadership. 676 $a262.0017 700 $aDreyer$b W. A.$01452500 801 2$bUkMaJRU 912 $a9910765711103321 996 $aPraktiese ekklesiologie ? Kerkwees in die 21ste eeu$93654118 997 $aUNINA LEADER 04193nam 22005775 450 001 9910383826803321 005 20200706053625.0 010 $a9781484257326 010 $a1484257324 024 7 $a10.1007/978-1-4842-5732-6 035 $a(CKB)4100000010771029 035 $a(DE-He213)978-1-4842-5732-6 035 $a(MiAaPQ)EBC6154417 035 $a(CaSebORM)9781484257326 035 $a(PPN)243229402 035 $a(OCoLC)1192501692 035 $a(OCoLC)on1192501692 035 $a(EXLCZ)994100000010771029 100 $a20200331d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCybersecurity for Space $eProtecting the Final Frontier /$fby Jacob G. Oakley 205 $a1st ed. 2020. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2020. 215 $a1 online resource (XIX, 164 p. 34 illus.) 311 08$a9781484257319 311 08$a1484257316 327 $aChapter 1: Space Systems -- Chapter 2: Space Challenges -- Chapter 3: Low Earth Orbit -- Chapter 4: Other Space Vehicles -- Chapter 5: Threats to the Vehicle -- Chapter 6: Threats to the Mission -- Chapter 7: Pre-Operational Vectors -- Chapter 8: Communications Vectors -- Chapter 9: Operational Vectors -- Chapter 10: Compromise Microanalysis -- Chapter 11: Compromise Macroanalysis -- Chapter 12: Summary. 330 $aThis is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in today?s world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations. You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems. The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems. You will: Understand what constitutes a space system and the challenges unique to operations of all spacecraft Get introduced to various space vehicles and their unique constraints and challenges Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit Know the physical and cyber vectors from which threats may manifest Study the micro- and macro-analysis provided of space system attack scenarios Be familiar with the high-level problems of cybersecurity in the space domain. 606 $aData protection 606 $aAerospace engineering 606 $aAstronautics 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aAerospace Technology and Astronautics$3https://scigraph.springernature.com/ontologies/product-market-codes/T17050 615 0$aData protection. 615 0$aAerospace engineering. 615 0$aAstronautics. 615 14$aSecurity. 615 24$aAerospace Technology and Astronautics. 676 $a327.1740919 700 $aOakley$b Jacob G$4aut$4http://id.loc.gov/vocabulary/relators/aut$01060615 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910383826803321 996 $aCybersecurity for Space$92514634 997 $aUNINA