Home > Store

Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edition, 2nd Edition

eBook

  • Your Price: $46.39
  • List Price: $57.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available in other formats.

Register your product to gain access to bonus material or receive a coupon.

Description

  • Copyright 2024
  • Edition: 2nd
  • eBook
  • ISBN-10: 0-13-805213-1
  • ISBN-13: 978-0-13-805213-3

Cloud Computing: Concepts, Technology, Security & Architecture

Cloud computing has become an integral and foundational part of information technology. The majority of digital business activity and technology innovation occurs with the involvement of contemporary cloud environments that provide highly sophisticated automated technology infrastructure and a vast range of technology resources. To successfully build upon, interact with, or create a cloud environment requires an understanding of its common inner mechanics, architectural layers, models, and security controls. It also requires an understanding of the business and economic factors that justify the adoption and real-world use of clouds and cloud-based products and services.

In Cloud Computing: Concepts, Technology, Security & Architecture, Thomas Erl, one of the world's top-selling IT authors, teams up with cloud computing expert Eric Barceló Monroy and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, technology mechanisms, and technology architectures. Comprehensive coverage of containerization and cybersecurity topics is also included.

All chapters are carefully authored from an industry-centric and vendor-neutral point of view. In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing and containerization platforms and solutions. With nearly 370 figures, 40 architectural models, and 50 mechanisms, this indispensable guide provides a comprehensive education of contemporary cloud computing, containerization, and cybersecurity that will never leave your side.

Sample Content

Table of Contents

Foreword
About the Authors
Acknowledgments
Chapter 1: Introduction
1.1 Objectives of This Book
1.2 What This Book Does Not Cover
1.3 Who This Book Is For
1.4 How This Book Is Organized
    Part I: Fundamental Cloud Computing
        Chapter 3: Understanding Cloud Computing
        Chapter 4: Fundamental Concepts and Models
        Chapter 5: Cloud-Enabling Technology
        Chapter 6: Understanding Containerization
        Chapter 7: Understanding Cloud Security and Cybersecurity
    Part II: Cloud Computing Mechanisms
        Chapter 8: Cloud Infrastructure Mechanisms
        Chapter 9: Specialized Cloud Mechanisms
        Chapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms
        Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms
        Chapter 12: Cloud Management Mechanisms
    Part III: Cloud Computing Architecture
        Chapter 13: Fundamental Cloud Architectures
        Chapter 14: Advanced Cloud Architectures
        Chapter 15: Specialized Cloud Architectures
    Part IV: Working with Clouds
        Chapter 16: Cloud Delivery Model Considerations
        Chapter 17: Cost Metrics and Pricing Models
        Chapter 18: Service Quality Metrics and SLAs
    Part V: Appendices
        Appendix A: Case Study Conclusions
        Appendix B: Common Containerization Technologies
1.5 Resources
    Pearson Digital Enterprise Book Series
    Thomas Erl on YouTube
        The Digital Enterprise Newsletter on LinkedIn
    Cloud Certified Professional (CCP) Program
Chapter 2: Case Study Background
2.1 Case Study #1: ATN
    Technical Infrastructure and Environment
    Business Goals and New Strategy
    Roadmap and Implementation Strategy
2.2 Case Study #2: DTGOV
    Technical Infrastructure and Environment
    Business Goals and New Strategy
    Roadmap and Implementation Strategy
2.3 Case Study #3: Innovartus Technologies Inc.
    Technical Infrastructure and Environment
    Business Goals and Strategy
    Roadmap and Implementation Strategy
PART I: FUNDAMENTAL CLOUD COMPUTING
Chapter 3: Understanding Cloud Computing
3.1 Origins and Influences
    A Brief History
    Definitions
    Business Drivers
        Cost Reduction
        Business Agility
    Technology Innovations
        Clustering
        Grid Computing
        Capacity Planning
        Virtualization
        Containerization
        Serverless Environments
3.2 Basic Concepts and Terminology
    Cloud
    Container
    IT Resource
    On Premises
    Cloud Consumers and Cloud Providers
    Scaling
        Horizontal Scaling
        Vertical Scaling
    Cloud Service
    Cloud Service Consumer
3.3 Goals and Benefits
    Increased Responsiveness
    Reduced Investments and Proportional Costs
    Increased Scalability
    Increased Availability and Reliability
3.4 Risks and Challenges
    Increased Vulnerability Due to Overlapping Trust Boundaries
    Increased Vulnerability Due to Shared Security Responsibility
    Increased Exposure to Cyber Threats
    Reduced Operational Governance Control
    Limited Portability Between Cloud Providers
    Multiregional Compliance and Legal Issues
    Cost Overruns
Chapter 4: Fundamental Concepts and Models
4.1 Roles and Boundaries
    Cloud Provider
    Cloud Consumer
    Cloud Broker
    Cloud Service Owner
    Cloud Resource Administrator
    Additional Roles
    Organizational Boundary
    Trust Boundary
4.2 Cloud Characteristics
    On-Demand Usage
    Ubiquitous Access
    Multitenancy (and Resource Pooling)
    Elasticity
    Measured Usage
    Resiliency
4.3 Cloud Delivery Models
    Infrastructure as a Service (IaaS)
    Platform as a Service (PaaS)
    Software as a Service (SaaS)
    Comparing Cloud Delivery Models
    Combining Cloud Delivery Models
        IaaS + PaaS
        IaaS + PaaS + SaaS
    Cloud Delivery Submodels
4.4 Cloud Deployment Models
    Public Clouds
    Private Clouds
    Multiclouds
    Hybrid Clouds
Chapter 5: Cloud-Enabling Technology
5.1 Networks and Internet Architecture
    Internet Service Providers (ISPs)
    Connectionless Packet Switching (Datagram Networks)
    Router-Based Interconnectivity
        Physical Network
        Transport Layer Protocol
        Application Layer Protocol
    Technical and Business Considerations
        Connectivity Issues
        Network Bandwidth and Latency Issues
        Wireless and Cellular
        Cloud Carrier and Cloud Provider Selection
5.2 Cloud Data Center Technology
    Virtualization
    Standardization and Modularity
    Autonomic Computing
    Remote Operation and Management
    High Availability
    Security-Aware Design, Operation, and Management
    Facilities
    Computing Hardware
    Storage Hardware
    Network Hardware
        Carrier and External Networks Interconnection
        Web-Tier Load Balancing and Acceleration
        LAN Fabric
        SAN Fabric
        NAS Gateways
    Serverless Environments
    NoSQL Clustering
    Other Considerations
5.3 Modern Virtualization
    Hardware Independence
    Server Consolidation
    Resource Replication
    Operating SystemBased Virtualization
    Hardware-Based Virtualization
    Containers and Application-Based Virtualization
    Virtualization Management
    Other Considerations
5.4 Multitenant Technology
5.5 Service Technology and Service APIs
    REST Services
    Web Services
    Service Agents
    Service Middleware
    Web-Based RPC
5.6 Case Study Example
Chapter 6: Understanding Containerization
6.1 Origins and Influences
    A Brief History
    Containerization and Cloud Computing
6.2 Fundamental Virtualization and Containerization
    Operating System Basics
    Virtualization Basics
        Physical Servers
        Virtual Servers
        Hypervisors
        Virtualization Types
    Containerization Basics
        Containers
        Container Images
        Container Engines
        Pods
        Hosts
        Host Clusters
        Host Networks and Overlay Networks
    Virtualization and Containerization
        Containerization on Physical Servers
        Containerization on Virtual Servers
        Containerization Benefits
        Containerization Risks and Challenges
6.3 Understanding Containers
    Container Hosting
    Containers and Pods
    Container Instances and Clusters
    Container Package Management
    Container Orchestration
    Container Package Manager vs. Container Orchestrator
    Container Networks
        Container Network Scope
        Container Network Addresses
    Rich Containers
    Other Common Container Characteristics
6.4 Understanding Container Images
    Container Image Types and Roles
    Container Image Immutability
    Container Image Abstraction
        Operating System Kernel Abstraction
        Operating System Abstraction Beyond the Kernel
    Container Build Files
        Container Image Layers
    How Customized Container Images Are Created
6.5 Multi-Container Types
    Sidecar Container
    Adapter Container
    Ambassador Container
    Using Multi-Containers Together
6.6 Case Study Example
Chapter 7: Understanding Cloud Security and Cybersecurity
7.1 Basic Security Terminology
    Confidentiality
    Integrity
    Availability
    Authenticity
    Security Controls
    Security Mechanisms
    Security Policies
7.2 Basic Threat Terminology
    Risk
    Vulnerability
    Exploit
    Zero-Day Vulnerability
    Security Breach
    Data Breach
    Data Leak
    Threat (or Cyber Threat)
    Attack (or Cyber Attack)
    Attacker and Intruder
    Attack Vector and Surface
7.3 Threat Agents
    Anonymous Attacker
    Malicious Service Agent
    Trusted Attacker
    Malicious Insider
7.4 Common Threats
    Traffic Eavesdropping
    Malicious Intermediary
    Denial of Service
    Insufficient Authorization
    Virtualization Attack
    Overlapping Trust Boundaries
    Containerization Attack
    Malware
    Insider Threat
    Social Engineering and Phishing
    Botnet
    Privilege Escalation
    Brute Force
    Remote Code Execution
    SQL Injection
    Tunneling
    Advanced Persistent Threat (APT)
7.5 Case Study Example
7.6 Additional Considerations
    Flawed Implementations
    Security Policy Disparity
    Contracts
    Risk Management
7.7 Case Study Example
PART II: CLOUD COMPUTING MECHANISMS
Chapter 8:
Cloud Infrastructure Mechanisms
8.1 Logical Network Perimeter
    Case Study Example
8.2 Virtual Server
    Case Study Example
8.3 Hypervisor
    Case Study Example
8.4 Cloud Storage Device
    Cloud Storage Levels
    Network Storage Interfaces
    Object Storage Interfaces
    Database Storage Interfaces
        Relational Data Storage
        Non-Relational Data Storage
    Case Study Example
8.5 Cloud Usage Monitor
    Monitoring Agent
    Resource Agent
    Polling Agent
    Case Study Example
8.6 Resource Replication
    Case Study Example
8.7 Ready-Made Environment
    Case Study Example
8.8 Container
Chapter 9: Specialized Cloud Mechanisms
9.1 Automated Scaling Listener
    Case Study Example
9.2 Load Balancer
    Case Study Example
9.3 SLA Monitor
    Case Study Example
        SLA Monitor Polling Agent
        SLA Monitoring Agent
9.4 Pay-Per-Use Monitor
    Case Study Example
9.5 Audit Monitor
    Case Study Example
9.6 Failover System
    ActiveActive
    ActivePassive
    Case Study Example
9.7 Resource Cluster
    Case Study Example
9.8 Multi-Device Broker
    Case Study Example
9.9 State Management Database
    Case Study Example
Chapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms
10.1 Encryption
    Symmetric Encryption
    Asymmetric Encryption
    Case Study Example
10.2 Hashing
    Case Study Example
10.3 Digital Signature
    Case Study Example
10.4 Cloud-Based Security Groups
    Case Study Example
10.5 Public Key Infrastructure (PKI) System
    Case Study Example
10.6 Single Sign-On (SSO) System
    Case Study Example
10.7 Hardened Virtual Server Image
    Case Study Example
10.8 Firewall
    Case Study Example
10.9 Virtual Private Network (VPN)
    Case Study Example
10.10 Biometric Scanner
    Case Study Example
10.11 Multi-Factor Authentication (MFA) System
    Case Study Example
10.12 Identity and Access Management (IAM) System
    Case Study Example
10.13 Intrusion Detection System (IDS)
    Case Study Example
10.14 Penetration Testing Tool
    Case Study Example
10.15 User Behavior Analytics (UBA) System
    Case Study Example
10.16 Third-Party Software Update Utility
    Case Study Example
10.17 Network Intrusion Monitor
    Case Study Example
10.18 Authentication Log Monitor
    Case Study Example
10.19 VPN Monitor
    Case Study Example
10.20 Additional Cloud Security Access-Oriented Practices and Technologies
Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms
11.1 Digital Virus Scanning and Decryption System
    Generic Decryption
    Digital Immune System
    Case Study Example
11.2 Malicious Code Analysis System
    Case Study Example
11.3 Data Loss Prevention (DLP) System
    Case Study Example
11.4 Trusted Platform Module (TPM)
    Case Study Example
11.5 Data Backup and Recovery System
    Case Study Example
11.6 Activity Log Monitor
    Case Study Example
11.7 Traffic Monitor
    Case Study Example
11.8 Data Loss Protection Monitor
    Case Study Example
Chapter 12: Cloud Management Mechanisms
12.1 Remote Administration System
    Case Study Example
12.2 Resource Management System
    Case Study Example
12.3 SLA Management System
    Case Study Example
12.4 Billing Management System
    Case Study Example
PART III: CLOUD COMPUTING ARCHITECTURE
Chapter 13:
Fundamental Cloud Architectures
13.1 Workload Distribution Architecture
13.2 Resource Pooling Architecture
13.3 Dynamic Scalability Architecture
13.4 Elastic Resource Capacity Architecture
13.5 Service Load Balancing Architecture
13.6 Cloud Bursting Architecture
13.7 Elastic Disk Provisioning Architecture
13.8 Redundant Storage Architecture
13.9 Multicloud Architecture
13.10 Case Study Example
Chapter 14: Advanced Cloud Architectures
14.1 Hypervisor Clustering Architecture
14.2 Virtual Server Clustering Architecture
14.3 Load-Balanced Virtual Server Instances Architecture
14.4 Nondisruptive Service Relocation Architecture
14.5 Zero Downtime Architecture
14.6 Cloud Balancing Architecture
14.7 Resilient Disaster Recovery Architecture
14.8 Distributed Data Sovereignty Architecture
14.9 Resource Reservation Architecture
14.10 Dynamic Failure Detection and Recovery Architecture
14.11 Rapid Provisioning Architecture
14.12 Storage Workload Management Architecture
14.13 Virtual Private Cloud Architecture
14.14 Case Study Example
Chapter 15: Specialized Cloud Architectures
15.1 Direct I/O Access Architecture
15.2 Direct LUN Access Architecture
15.3 Dynamic Data Normalization Architecture
15.4 Elastic Network Capacity Architecture
15.5 Cross-Storage Device Vertical Tiering Architecture
15.6 Intra-Storage Device Vertical Data Tiering Architecture
15.7 Load-Balanced Virtual Switches Architecture
15.8 Multipath Resource Access Architecture
15.9 Persistent Virtual Network Configuration Architecture
15.10 Redundant Physical Connection for Virtual Servers Architecture
15.11 Storage Maintenance Window Architecture
15.12 Edge Computing Architecture
15.13 Fog Computing Architecture
15.14 Virtual Data Abstraction Architecture
15.15 Metacloud Architecture
15.16 Federated Cloud Application Architecture
PART IV: WORKING WITH CLOUDS
Chapter 16:
Cloud Delivery Model Considerations
16.1 Cloud Delivery Models: The Cloud Provider Perspective
    Building IaaS Environments
        Data Centers
        Scalability and Reliability
        Monitoring
        Security
    Equipping PaaS Environments
        Scalability and Reliability
        Monitoring
        Security
    Optimizing SaaS Environments
        Security
16.2 Cloud Delivery Models: The Cloud Consumer Perspective
    Working with IaaS Environments
        IT Resource Provisioning Considerations
    Working with PaaS Environments
        IT Resource Provisioning Considerations
    Working with SaaS Services
16.3 Case Study Example
Chapter 17: Cost Metrics and Pricing Models
17.1 Business Cost Metrics
    Up-Front and Ongoing Costs
    Additional Costs
Case Study Example
    Product Catalog Browser
        On-Premises Up-Front Costs
        On-Premises Ongoing Costs
        Cloud-Based Up-Front Costs
        Cloud-Based Ongoing Costs
17.2 Cloud Usage Cost Metrics
    Network Usage
        Inbound Network Usage Metric
        Outbound Network Usage Metric
        Intra-Cloud WAN Usage Metric
    Server Usage
        On-Demand Virtual Machine Instance Allocation Metric
        Reserved Virtual Machine Instance Allocation Metric
    Cloud Storage Device Usage
        On-Demand Storage Space Allocation Metric
        I/O Data Transferred Metric
    Cloud Service Usage
        Application Subscription Duration Metric
        Number of Nominated Users Metric
        Number of Transactions Users Metric
17.3 Cost Management Considerations
    Pricing Models
    Multicloud Cost Management
    Additional Considerations
Case Study Example
    Virtual Server On-Demand Instance Allocation
    Virtual Server Reserved Instance Allocation
    Cloud Storage Device
    WAN Traffic
Chapter 18: Service Quality Metrics and SLAs
18.1 Service Quality Metrics
    Service Availability Metrics
        Availability Rate Metric
        Outage Duration Metric
    Service Reliability Metrics
        Mean Time Between Failures (MTBF) Metric
        Reliability Rate Metric
    Service Performance Metrics
        Network Capacity Metric
        Storage Device Capacity Metric
        Server Capacity Metric
        Web Application Capacity Metric
        Instance Starting Time Metric
        Response Time Metric
        Completion Time Metric
    Service Scalability Metrics
        Storage Scalability (Horizontal) Metric
        Server Scalability (Horizontal) Metric
        Server Scalability (Vertical) Metric
    Service Resiliency Metrics
        Mean Time to Switchover (MTSO) Metric
        Mean Time to System Recovery (MTSR) Metric
18.2 Case Study Example
18.3 SLA Guidelines
18.4 Case Study Example
        Scope and Applicability
        Service Quality Guarantees
        Definitions
        Usage of Financial Credits
        SLA Exclusions
PART V: APPENDICES
Appendix A:
Case Study Conclusions
A.1 ATN
A.2 DTGOV
A.3 Innovartus
Appendix B: Common Containerization Technologies
B.1 Docker
    Docker Server
    Docker Client
    Docker Registry
    Docker Objects
    Docker Swarm (Container Orchestrator)
B.2 Kubernetes
    Kubernetes Node (Host)
    Kubernetes Pod
    Kubelet
    Kube-Proxy
    Container Runtime (Container Engine)
    Cluster
    Kubernetes Control Plane


9780138052256    TOC    7/17/2023

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020