Authorized Version Publications

Settings of the King James Bible by G.A. Riplinger CD-Rom $29.95

The result of a many year, word-by-word and letter-by-letter analysis of printers and their various settings of the KJB, such as Cambridge, Oxford, Scofield, Zondervan, ABS, the PCE (so-called pure Cambridge text) and others, comparing them to settings in 1611, 1629, 1638, and later settings. The Bibles A.V. Publications offers are a result of this laborious study. 22 pages. CD-Rom

This product was added to our catalog on Thursday 23 August, 2012.
 
Customers who bought this product also purchased
 
 
Valera Spanish 1602P Leather
Valera Spanish 1602P Leather
The Charted History of the Bible by Kahler
The Charted History of the Bible by Kahler
Early Church Fathers and the A.V. by Dr. Moorman
Early Church Fathers and the A.V. by Dr. Moorman
HOLLAND CRITIQUES WHITE
HOLLAND CRITIQUES WHITE
NITELINE DVD: Riplinger
NITELINE DVD: Riplinger
Why the King James Bible Is the Perfect Word of God
Why the King James Bible Is the Perfect Word of God
 
     

 

 
Shopping Cart
more  
 
0 items
 
     
 
Categories
 
 
Goto...
Riplinger KJV Materials (46)
Riplinger TV & Radio Lectures (17)
What's New (72)
KJV Tracts (8)
KJV Authors (56)
KJV Bibles (39)
KJV Music, Cards, etc. (15)
KJV Dictionaries and Concordance (6)
 
     

  1. Hazardous Materials

  2. New Age Bible Versions

  3. In Awe Of Thy Word

  4. Which Bible Is God's Word? Update 2007

  5. The Language of the King James Bible

  6. Blind Guides

  7. Cambridge Large-Print Holy Bible

  8. Transparent Translations DVD

  9. In Awe of Thy Word 3 CD-ROM set

  10. The Only Authorized Picture of Christ

  11. God Hath Done All Things Well

 
Specials
more  
 
2 Riplinger Bestsellers + FREE Niteline DVD
2 Riplinger Bestsellers + FREE Niteline DVD
$84.90
$59.90
 
     
 
Quick Find
 
 
 
Use keywords to find the product you are looking for.
Advanced Search
 
     
Thank You For Visiting AVPublications
SecurityMetrics for PCI Compliance, QSA, IDS, Penetration Testing, Forensics, and Vulnerability Assessment