Home > Store

Java Programming Language, The, 2nd Edition

Register your product to gain access to bonus material or receive a coupon.

Java Programming Language, The, 2nd Edition

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

You will find in-depth and progressively advanced coverage of classes and objects, interfaces, exception-handling, threads and multitasking, and packages. In addition, the book describes the Java core library packages, including I/O, standard utilities, language types, and system classes.

Thoroughly revised from start to finish, this second edition fully integrates Java 1.1 into both text and examples. This edition includes the changes introduced in Java 1.1, such as nested classes (including anonymous classes), threading issues, character-based streams, object-serialization, documentation comments, new utility classes, plus internationalization and localization.

The book lets you in on the rationale behind Java's design, direct from the language's creator, as well as the tradeoffs involved in using specific features. With these insights, you will have the understanding you need to begin developing Java applications and applets.

Description

  • Copyright 1998
  • Edition: 2nd
  • Book
  • ISBN-10: 0-201-31006-6
  • ISBN-13: 978-0-201-31006-1

Third Edition
now available!

Co-authored by the creator of the Java technology and an experienced object-oriented developer, The JavaTM Programming Language, Second Edition, is the definitive resource for all serious Java programmers. This book will give you a solid foundation in Java programming language strategies and techniques. It features a concise introduction to the language; detailed descriptions of Java's commands, constructs, and libraries; and numerous real-world examples that show you how to exploit the language's power, portability, and flexibility.

You will find in-depth and progressively advanced coverage of classes and objects, interfaces, exception-handling, threads and multitasking, and packages. In addition, the book describes the Java core library packages, including I/O, standard utilities, language types, and system classes.

Thoroughly revised from start to finish, this second edition fully integrates Java 1.1 into both text and examples. This edition includes the changes introduced in Java 1.1, such as nested classes (including anonymous classes), threading issues, character-based streams, object-serialization, documentation comments, new utility classes, plus internationalization and localization.

The book lets you in on the rationale behind Java's design, direct from the language's creator, as well as the tradeoffs involved in using specific features. With these insights, you will have the understanding you need to begin developing Java applications and applets.



0201310066B04062001

Sample Content

Table of Contents

1. A Quick Tour of Java.
Getting Started.
Variables.
Comments in Code.
Named Constants.
Unicode Characters.

Flow of Control.
Classes and Objects.
Creating Objects.
Static or Class Fields.
The Garbage Collector.

Methods and Parameters.
Invoking a Method.
The this Reference.
Static or Class Methods.

Arrays.
String Objects.
Extending a Class.
Invoking Methods from the Superclass.
The Object Class.

Interfaces.
Exceptions.
Packages.
The Java Platform.
Other Topics Briefly Noted.

2. Classes and Objects.
A Simple Class.
Fields.
Access Control and Inheritance.
Creating Objects.
Constructors.
Methods.
Parameter Values.
Using Methods to Control Access.

this.
Overloading Methods.
Static Members.
Initialization Blocks.
Garbage Collection and finalize.
finalize.
Resurrecting Objects During finalize.

Nested Classes and Interfaces.
Local Inner Classes.

main.
The to String Method.
Native Methods.

3. Extending Classes.
An Extended Class.
What protected Really Means.
Constructors in Extended Classes.
Constructor Order Dependencies.

Overriding Methods, Hiding Fields and Nested Classes.
The super Keyword.

Marking Methods and Classes final.
The Object Class.
Anonymous Classes.
Abstract Classes and Methods.
Cloning Objects.
Extending Classes: How and When.
Designing a Class to Be Extended.

4. Interfaces.
An Example Interface.
Single Inheritance versus Multiple Inheritance.
Extending Interfaces.
Name Conflicts.

Implementing Interfaces.
Using an Implementation.
Marker Interfaces.
When to Use Interfaces.

5. Tokens, Operators, and Expressions.
Character Set.
Comments.
Tokens.
Identifiers.
Java Keywords.

Primitive Types.
Literals.
Object References.
Boolean.
Integers.
Floating-Point Numbers.
Characters.
Strings.
Class Literals.

Declarations of Variables.
Using final for Variables.
The Meanings of Names.

Array Variables.
Arrays of Arrays.

Initial Values.
Array Initializers.

Operator Precedence and Associativity.
Order of Evaluation.
Expression Type.
Type Conversions.
Implicit Conversion.
Explicit Casts and instance of.
String Conversions.

Member Access.
Arithmetic Operators.
Integer Arithmetic.
Floating-Point Arithmetic.
Java Floating-Point Arithmetic and IEEE-754.
String Concatenation.

Increment and Decrement Operators.
Relational, Equality, and Logical Operators.
Bitwise Operators.
The Conditional Operator?
Assignment Operators.
Package Names.

6. Control Flow.
Statements and Blocks.
if-else.
switch.
while and do-while.
for.
Labels.
break.
continue.
return.
What, No go to?

7. Exceptions.
Creating Exception Types.
throw.
The throws Clause.
try, catch, and finally.
finally.

When to Use Exceptions.

8. Strings.
Basic String Operations.
String Comparisons.
Utility Methods.
Making Related Strings.
String Conversions.
Strings and char Arrays.
Strings and byte Arrays.
The String Buffer Class.
Modifying the Buffer.
Getting Data Out.
Capacity Management.


9. Threads.
Creating Threads.
Synchronization.
synchronized Methods.
synchronized Statements.

wait and notify.
Details of wait and notify.
Thread Scheduling.
Deadlocks.
Ending Thread Execution.
The End of a Thread's Life.
Waiting For a Thread to Complete.
Don't stop.
Suspending Threads.

Ending Application Execution.
Using Runnable.
volatile.
Thread Security and Thread Group.
Debugging Threads.

10. Packages.
Package Naming.
Package Access.
Package Contents.

11. Documentation Comments.
Paragraphs.
@see.
@param.
@return.
@exception.
@deprecated.
@author.
@version.
@since.

An Example.
Notes on Usage.

12. The I/O Package.
Byte Streams.
Input Stream.
Output Stream.
Character Streams.
Character Streams and the Standard Streams.

Reader.
Writer.
Summary of I/O Types.
Input Stream Reader and Output Stream Writer.
Filter Streams.
Print Streams.
Buffered Streams.
Byte Array Byte Streams.
Char Array Character Streams.
String Character Streams.
File Streams and File Descriptor.
Piped Streams.
Sequence Input Stream.
Line Number Reader.
Pushback Streams.
Stream Tokenizer.
Data Byte Streams.
The Data Stream Classes.
Random Access File.
The Object Byte Streams.
Making Your Classes Serializable.
Serialization and Deserialization Order.
Customized Serialization and Externalizable.
Object Versioning.
The Externalizable Interface.

The File Class.
Filename Filter.
The IO Exception Classes.

13. Standard Utilities.
Bit Set.
Enumeration.
Implementing an Enumeration Interface.
Vector.
Stack.
Dictionary.
Hashtable.
Properties.
Observer/Observable.
Random.
String Tokenizer.

14. Programming with Types.
Wrapper Classes: An Overview.
Void.
Boolean.
Character.
Number.
The Integer Wrapper Classes.
The Floating-Point Wrapper Classes.
Reflection.
Class.
Examining Classes.
Field.
Method.
Creating New Objects and Constructor.
Arrays.

Loading Classes.
Loading Related Resources.


15. System Programming.
Standard I/O Streams.
Memory Management.
System Properties.
Creating Processes.
Runtime.
Miscellaneous.
Security.
Math.

16. Internationalization and Localization.
Locale.
Resource Bundles.
List Resource Bundle.
Property Resource Bundle.
Subclassing Resource Bundle.

Time, Dates, and Calendars.
Calendars.
Time Zones.
Gregorian Calendar and Simple Time Zone.

Formatting and Parsing Dates and Times.

17. Standard Packages.
java.text - Internationalization and Localization for Text.
Collation.
Formatting and Parsing.
Text Boundaries.

java.awt-The Abstract Window Toolkit.
java.applet-Applets.
java.rmi-Remote Method Invocation.
java.beans-Java Components.
java.net-The Network.
java.math-Mathematics.
java.sql - Relational Database Access.
java.security - Security Tools.

Appendix A. Runtime Exceptions.
Runtime Exception Classes.
Error Classes.

Appendix B. Useful Tables.
Table 1: Keywords.
Table 2: Operator Precedence.
Table 3: Unicode Digits.
Table 4: Unicode Letters and Digits.
Table 5: Special Characters Using \.
Table 6: Documentation Comment Tags.

Further Reading. 0201310066T04062001

Preface

Preface

Beautiful buildings are more than scientific. They are true organisms, spiritually conceived; works of art, using the best technology by inspiration rather than the idiosyncrasies of mere taste or any averaging by the committee mind.

-Frank Lloyd Wright

THE Java programming language (hereafter called simply Java) has been warmly received by the world community of software developers and Internet content providers. Users of the Internet and World Wide Web benefit from access to secure, platform-independent applications that can come from anywhere on the Internet. Software developers who create applications in Java benefit by develop- ing code only once, with no need to "port" their applications to every software and hardware platform.

For many, Java was known first as a tool to create applets for the World Wide Web. Applet is the term Java uses for a mini-application that runs inside a web page. An applet can perform tasks and interact with users on their browser pages without using resources from the Web server after being downloaded. Some applets may, of course, interact with the server for their own purposes, but that's their business.

Java is indeed valuable for distributed network environments like the Web. However, Java goes well beyond this domain to provide a powerful general-pur- pose programming language suitable for building a variety of applications that either do not depend on network features, or want them for different reasons. Java's ability to execute downloaded code on remote hosts in a secure manner is a critical requirement for many organizations.

Other groups use Java as a general-purpose programming language for projects in which machine independence is less important. Java's ease of pro- gramming and safety features help you quickly produce working code. Some common programming errors never occur because of features like garbage collec- tion and type-safe references. Java's support for multithreading caters to modern network-based and graphical user interface-based applications that must attend to multiple tasks simultaneously, and the mechanisms of exception handling ease the task of dealing with error conditions. While its built-in tools are powerful, the Java language is a simple language in which programmers can quickly become profi- cient.

Java is designed for maximum portability with as few implementation depen- dencies as possible. An int, for example, is a 32-bit signed two's-complement integer in all Java implementations, irrespective of the CPU architecture on which the Java program executes. Defining everything possible about the language and its runtime environment enables users to run compiled code anywhere and share code with anyone who has a Java environment.

About This Book

This book teaches Java programming to people who are familiar with basic pro- gramming concepts. It explains Java without being arduously formal or complete. This book is not an introduction to object-oriented programming, although some issues are covered to establish a common terminology. Other books in this series, and much online documentation, focus on Java applets, databases, components, and other specific kinds of programming tasks. For other references, see "Further Reading" on page 381.

This second edition includes the changes introduced in Java 1.1, such as nested classes (including anonymous classes), threading issues, character-based streams, object serialization, documentation comments, new utility classes, and internationalization/localization. You will also find brief coverage of the other core Java packages. If you have already read the first edition, this edition will give you new information, but since most of the language is unchanged, and almost all core packages types are still usable, you will want to pay most attention to the newer areas. The first chapter (the "quick tour") is largely unchanged because it covers the elemental parts of Java, which have changed little.

Java shares many language features common to most programming languages in use today. Java should look familiar to C and C++ programmers, because Java was designed with C and C++ constructs where the languages are similar. That said, this book is neither a comparative analysis nor a "bridge" tutorial-no knowledge of C or C++ is assumed. C++ programmers, especially, may be as hin- dered by what they must unlearn as they are helped by their knowledge.

Chapter 1-A Quick Tour of Java-gives a quick overview of Java. Program- mers who are unfamiliar with object-oriented programming notions should read the quick tour, while programmers who are already familiar with object-oriented programming paradigms will find the quick tour a useful introduction to the object-oriented features of Java.

Chapters 2, 3, and 4 cover the object-oriented core features of Java, namely, class declarations that define components of a program, and objects manufactured according to class definitions. Chapter 2-Classes and Objects-describes the basis of the Java language: classes. Chapter 3-Extending Classes-describes how an existing class can be extended, or subclassed, to create a new class with additional data and behavior. Chapter 4-Interfaces-describes how to declare interface types which are abstract descriptions of behavior that provide maximum flexibility for class designers and implementers.

Chapters 5 and 6 cover standard constructs common to most languages. Chap- ter 5-Tokens, Operators, and Expressions-describes the tokens of the language from which statements are constructed, how the tokens and operators are used to build expressions, and how expressions are evaluated. Chapter 6-Control Flow-describes how control statements direct the order of statement execution.

Chapter 7-Exceptions-describes Java's powerful error-handling capabili- ties. Chapter 8-Strings-describes the built-in language and runtime support for String objects.

Chapter 9-Threads-explains Java's implementation of multithreading. Many applications, such as graphical interface-based software, must attend to multiple tasks simultaneously. These tasks must cooperate to behave correctly, and threads meet the needs of cooperative multitasking.

Chapter 10-Packages-describes Java's mechanism for grouping collections of Java classes into separate packages. Chapter 11-Documentation Comments- shows how to write reference documentation in comments.

Chapters 12 through 15 cover the main body of the core Java class library packages. Chapter 12-The I/O Package-describes the Java input/output system, which is based on streams. Chapter 13-Standard Utilities-covers Java utility classes such as vectors and hashtables. Chapter 14-Programming with Types- describes Java's type-related classes: individual objects that describe each class and interface, and classes that wrap primitive data types such as integers and float- ing-point values into their own object types. Chapter 15-System Programming- leads you through the system classes that provide access to features of the under- lying platform.

Chapter 16- Internationalization and Localization-covers some of the tools used to create programs that can run in many linguistic and cultural environ- ments. Chapter 17-Standard Packages-briefly explores the packages that are part of the Java platform, giving overviews of those packages not covered in more detail in this book.

Appendix A-Runtime Exceptions-lists all the runtime exceptions and errors that the Java system itself can throw.

Appendix B-Useful Tables-has tables of information that you may find useful for quick reference.

Finally, Further Reading lists works that may be interesting for further read- ing on Java details, object orientation, programming with threads, software design, and other topics.

Examples and Documentation

All the code examples in the text have been compiled and run on the latest version of the language available at the time the book was written, which was version 1.1.4. Only Java 1.14 features are covered-deprecated types, methods, and fields are ignored except where unavoidable. We have also covered issues beyond writ- ing programs that simply compile. Part of learning a language is to learn to use it well. For this reason, we have tried to show principles of good programming style and design.

In a few places we refer to online documentation. Java development environ- ments provide a way to automatically generate documentation (usually HTML documents) from a compiled class using the documentation comments. This docu- mentation is normally viewed using a Web browser.

Acknowledgments (First Edition)

No technical book-writing endeavor is an island unto itself, and ours was more like a continent. Many people contributed technical help, excellent reviews, useful information, and book-writing advice.

Contributing Editor Henry McGilton of Trilithon Software played the role of "Chief Editorial Firefighter" to help make this book possible. Series Editor Lisa Friendly contributed dogged perseverance and support.

A veritable multitude of reviewers took time out of their otherwise busy lives to read, edit, advise, revise, and delete material, all in the name of making this a better book. Kevin Coyle performed one of the most detailed editorial reviews at all levels. Karen Bennet, Mike Burati, Patricia Giencke, Steve Gilliard, Bill Joy, Rosanna Lee, Jon Madison, Brian O'Neill, Sue Palmer, Stephen Perelgut, R. Anders Schneiderman, Susan Sim, Bob Sproull, Guy Steele, Arthur van Hoff, Jim Waldo, Greg Wilson, and Ann Wollrath provided in-depth review. Geoff Arnold, Tom Cargill, Chris Darke, Pat Finnegan, Mick Jordan, Doug Lea, Randall Murray, Roger Riggs, Jimmy Torres, Arthur van Hoff, and Frank Yellin contributed useful comments and technical information at critical junctures.

Alka Deshpande, Sharon Flank, Nassim Fotouhi, Betsy Halstead, Kee Hinck- ley, Dr. K. Kalyanasundaram, Patrick Martin, Paul Romagna, Susan Snyder, and Nicole Yankelovich collaborated to make possible the five words of non-ISO- Latin-1 text on pages 106 and 260. Jim Arnold provided research help on the proper spelling, usage, and etymology of "smoog" and "moorge." Ed Mooney helped with the document preparation. Herb and Joy Kaiser were our Croatian language consultants. Cookie Callahan, Robert E. Pierce, and Rita Tavilla pro- vided the support necessary to keep this project going at many moments when it would otherwise have stalled with a sputtering whimper.

Thanks to Kim Polese for supplying us the capsule summary of why Java is important to computer users as well as programmers.

Support and advice were provided at critical moments by Susan Jones, Bob Sproull, Jim Waldo, and Ann Wollrath. And we thank our families, who, besides their loving support, would at times drag us out to play when we should have been working, for which we are deeply grateful.

And thanks to the folks at Peet's Coffee and Tea, who kept us buzzed on the best Java on the planet.

Acknowledgments (Second Edition)

The cast of characters for this second edition is much like the first.

Series Editor Lisa Friendly continued to be doggedly supportive and attentive.

The set of reviewers was smaller, overlapping, and certainly as helpful and thorough. Overall reviews by Steve Byrne, Tom Cargill, Mary Dageforde, Tim Lindholm, and Rob Murray were critical to clarity. Brian Beck, Peter Jones, Doug Lea, Bryan O'Sullivan, Rosanna Lee, Lori Park, Mark Reinhold, Roger Riggs, Ann Wollrath, and Ken Zadek contributed focused reviews of important parts. Guy Steele's support was ongoing, and warm. Rosemary Simpson's extensive and intensive efforts to make a useful index are deeply appreciated. Carla Carlson gave critical logistic support that kept all the wheels on the tracks instead of in the ditch. All who submitted errata and suggestions from the first edition were help- ful.

For some inexplicable reason we left the friendly folks of Addison-Wesley off the original acknowledgments-luckily, most of them were present again for this edition. A merged list for both editions includes Kate Duffy, Rosa Gonzales, Mike Hendrickson, Marina Lang, Shannon Patti, Marty Rabinowitz, Sarah Weaver, and Pamela Yee. Others did much that we are blissfully unaware of, but for which we are nonetheless abidingly grateful.

Gerry Wiener provided the Tibetan word on page 260, and we also had help on this from Craig Preston and Takao Miyatani.

And Peet's Coffee and Tea continued its supporting role as purveyor to the caffeine-consuming connoisseur.

Any errors or shortcomings that remain in this book-despite the combined efforts of these myriads-are completely the responsibility of the authors.

Results! Why, man, I have gotten a lot of results. I know several thousand things that won't work.

-Thomas Edison

0201310066P04062001

Updates

Errata

Click below for Errata related to this title:
1_2Update.pdf

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020