Chapter 5. Serializing
TODO
Next up:
Security implications