Ideal for software engineers new to privacy, this book helps you examine privacy-protective information management architectures and their foundational components-building blocks that you can combine in many ways.