T zero

Results: 433



#Item
211Environmental social science / Zero waste / Low-carbon economy / Environment / Sustainability / Environmentalism

Ravenglass and Eskdale Railway Company ENVIRONMENTAL POLICY 2015 Good environmental stewardship is fundamental to meeting the needs and expectations of all who enjoy the Ravenglass & Eskdale Railway as well as our long t

Add to Reading List

Source URL: ravenglass-railway.co.uk

Language: English - Date: 2015-01-02 11:17:47
212Bill de Blasio / Sustainable architecture / Sustainable building / Landscape architecture / PlaNYC / Zero waste / Green-collar worker / Green building / Sustainable city / Environment / Sustainability / Architecture

A FRAMEWORK FOR A SUSTAINABLE CITY Climate change, a fast-changing economy, and new pressures to preserve our environment combine to make urban sustainability an urgent priority. At the same time, sustainability offers t

Add to Reading List

Source URL: dnwssx4l7gl7s.cloudfront.net

Language: English - Date: 2013-06-20 15:03:18
213Architectural theory / Architecture / Sustainable architecture / Sustainable building / Sustainable design / Fashion design / Zero Waste Fashion / Textile / Fashion / Environment / Sustainability / Visual arts

ORGANISED BY T H E E C O C H I C D E S I G N A W A R DAPPLICATION GUIDELINES

Add to Reading List

Source URL: www.ecochicdesignaward.com

Language: English - Date: 2015-04-16 01:21:28
214System software / FireEye /  Inc. / Malware / Zero-day attack / Threat / Rogue security software / Targeted threat / Computer network security / Computer security / Cyberwarfare

FireEye helps City of Miramar boost security and manage costs C U S T O M E R SECURITY REIMAGINED

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-05-01 06:26:31
215Provo /  Utah / Web search engine / Tipster / Internet / Science / Internet search engines / Information science / Information retrieval / Ancestry.com

Looking for search results that are right on target? Try Ancestry Anne’s search tips, from basic to advanced. You won’t use them all at once but each can help you zero in on your search for answers. Tip 1: Start by e

Add to Reading List

Source URL: www.rvgsociety.org

Language: English - Date: 2013-02-19 20:14:03
216Kludge / Software bug / Software development process / Hacker / X Window System / Computing / Software / Software quality

software construction Editors: Andy Hunt and Dave Thomas ■ The Pragmatic Programmers a n d y @ p r a g m a t i c p r o g r a m m e r. c o m ■ d a v e @ p r a g m a t i c p r o g r a m m e r. c o m Zero-Tolerance Cons

Add to Reading List

Source URL: media.pragprog.com

Language: English - Date: 2007-10-31 17:44:24
217Sustainability / Industrial ecology / Sustainable building / EPA Sustainability / Zero waste / Environment / Environmental social science / Environmentalism

Ai GROUP and EPA Victoria SUSTAINABILITY COVENANT e n vi r o n m e n t &

Add to Reading List

Source URL: pdf.aigroup.asn.au

Language: English - Date: 2012-10-31 23:11:14
218Photovoltaic system / Solar panel / Feed-in tariff / Solar power / Solar energy / Zero-energy building / Solar vehicle / Watt-peak / Solar power by country / Energy / Photovoltaics / Renewable energy

29th European Photovoltaic Solar Energy Conference and Exhibition “COUNTING THE SUN” – A DUTCH PUBLIC AWARENESS CAMPAIGN ON PV PERFORMANCE Wilfried G.J.H.M. van Sark1,2,*, S. ‘t Hart1,3, M.M. de Jong1, P. de Rij

Add to Reading List

Source URL: www.seac.cc

Language: English - Date: 2014-12-15 08:46:07
219Reading / Dyslexia / Educational psychology / Education / Linguistics

OUT OF EDEN LEARN “You can’t just explore the world from a textbook” th 5 grade Out of Eden Learn participant, Marblehead, Massachusetts, USA Out of Eden Learn is Project Zero’s unique online learning community d

Add to Reading List

Source URL: outofeden.s3.amazonaws.com

Language: English - Date: 2015-03-24 11:10:08
220Hacking / Computing / Attack / Vulnerability / Zero-day attack / Denial-of-service attack / DNS spoofing / Domain Name System Security Extensions / Internet security / Computer network security / Cyberwarfare / Computer security

I n t e r ne t I n f r a s t r u c t u re Rev i e w Vol.21 Infrastructure Security The PlugX RAT Used in Targeted Attacks

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2015-05-20 03:08:08
UPDATE