This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
require("babel-polyfill"); | |
var str = "fooBar"; | |
console.log(str.split(/(?=[A-Z])/)); |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
const re = /./; | |
re.lastIndex = { valueOf: () => -1; }; | |
// Correctly turns the lastIndex object into a non-negative number | |
// through ToLength. | |
re.exec(""); |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
diff --git a/src/bench/CMakeLists.txt b/src/bench/CMakeLists.txt | |
index f2af0b5..6fa890c 100644 | |
--- a/src/bench/CMakeLists.txt | |
+++ b/src/bench/CMakeLists.txt | |
@@ -26,6 +26,7 @@ target_link_libraries(random | |
skip_queue | |
spraylist | |
thread_local_ptr | |
+ rt | |
) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
10.1 explain the differences among the terms security class, security level, security clearance, and security classification. | |
Context: BLP model, access control concept | |
security class - assigned to each subject and object, in the simplest form: | |
security level - form a strict hierarchy and are referred to as security levels (top secret -> secret -> ...) | |
security clearance - a subject is said to have a security clearance of a given level | |
security classification - an object is said to have a security classification of a given level | |
10.2 what are the three rules specified by the BLP model? |