Chena Lee

77%
Flag icon
Cryptographic auditing and integrity checking often relies on Merkle trees [74],
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems
Rate this book
Clear rating
Open Preview