LET'S CONNECT!
Enter for a chance to win an eBook of your choice from InformIT. Fill out the form.
Register your product to gain access to bonus material or receive a coupon.
"Avi Rubin does a great job of explaining the motivations behind many security solutions, as well as providing practical information about how you can solve real-world problems. White-Hat Security Arsenal is an invaluable resource--a judicious mix of practical information and the theory behind it."
--Marcus J. Ranum, CTO, NFR Security, Inc."White-Hat Security Arsenal ups the ante for the good guys in the arms race against computer-based crime. Like a barrage of cruise missiles, Avi's excellent book attains air superiority by leveraging smarts and advanced GPS technology to zero in on critical targets. Intended to educate and inform information security professionals with a no-nonsense, hold-the-hype approach to security, this book is a critical weapon for modern information warriors. If you wear a white hat and are on the good guys' team, buy this book. Don't go into battle without it!"
--Gary McGraw, Ph.D., CTO, CigitalHow do I allow secure remote access to my site? How do I protect data on my laptop in case it's stolen? How should I configure my firewall? Will I regret using my credit card online? How will the bad guys attack? If these are some of the questions that keep you awake at night, you need to read this book.
As a computer security expert at AT&T Labs, author Avi Rubin regularly meets with IT staffs from all types of companies. When asked to recommend resource material to his customers, Rubin realized that there just wasn't a book on the market that would give them concise, direct answers to all their security questions. So he wrote one.
Using a problem-oriented approach, Rubin walks you through everything from protecting against network threats to using credit cards on the Web. Each chapter begins with a problem statement, continues with a description of the threat, explains the technologies involved, and then offers solutions. Chapters conclude with one or more case studies.
You'll find easy-to-understand information that will help youWhether you are an IT professional, a system administrator, an academic, or simply a regular Internet user, White-Hat Security Arsenal is full of information you can't afford to miss.
Interview with Security Expert Avi Rubin
Protecting Web Sites by Guarding the Exits
Risks of the Passport Single Signon Protocol
Security Considerations for Remote Electronic Voting over the Internet
The Computer Security Bookshelf, Part 2
Click below for Author's Site related to this title:
Author's Web Site
Secure Backup: Protecting Your Data
Click below for Sample Chapter related to this title:
rubinch6.pdf
Foreword.
Preface.
I: IS THERE REALLY A THREAT?
1. Shrouded in Secrecy.What Is at Risk.
Data, Time, and Money.
Confidentiality.
Privacy.
Resource Availability.
Why Risks Exist.
Buggy Code.
The User.
Poor Administration.
Exploiting Risks.
Moving On.
3. The Morris Worm Meets the Love Bug: Computer Viruses and Worms.Terminology.
A Touch of History.
The Morris Worm.
When It Hit and What It Did.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.
Melissa.
When It Hit and What It Did.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.
CIH Chernobyl.
When It Hit and What It Did.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.
Happy.
When It Hit and What It Did.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.
Worm.ExploreZip.
When It Hit and What It Did.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.
Bubbleboy.
When It Hit and What It Did.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.
Babylonia.
When It Hit and What It Did.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.
The Love Bug.
When It Hit and What It Did.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.
Summary.
II: STORING DATA SECURELY.
4. Local Storage.Physical Security.
Cryptographic Security.
What Can Be Achieved with Cryptography.
Cryptography Is Not Enough.
Basic Encryption and Data Integrity.
Protecting Data with Passwords.
Graphical Passwords.
Cryptographic File Systems.
Case Studies.
CFS.
PGPDisk.
EFS in Windows 2000.
Further Reading.
5. Remote Storage.Remote Storage.
NFS Security.
Adding Security.
User Authentication.
Strengthening Passwords.
Access Control Lists and Capabilities.
AFS.
Case Study.
Pathnames.
Further Reading.
6. Secure Backup.Secure Backups.
Physical Security.
Backup over a Network.
Key Granularity.
Backup Products.
@backup.
BitSTOR.
Secure Backup Systems.
BackJack.
Datalock.
NetMass SystemSafe.
Saf-T-Net.
Safeguard Interactive.
Veritas Telebackup.
Deleting Backups.
Case Study.
The Client Software.
Incremental Backups.
Further Reading.
III: SECURE DATA TRANSFER.
7. Setting up a Long-Term Association.What Is Identity?
Identity in Cyberspace.
Exchanging Public Keys in Person.
Certification Authorities.
Public Key Certificates.
Certificate Hierarchies.
Long-Term Relationships within an Organization.
Global Trust Register.
Revocation.
Long-Term Relationships in the Wild.
Managing Private Keys.
Symmetric Keys.
Case Study.
Summary.
Further Reading.
8. Deriving Session Keys.Long-Term Keys Are Not Enough.
What Are Session Keys?
Key Exposure.
Perfect Forward Secrecy.
Security Associations.
Picking a Random Key.
Session Keys from Symmetric Long-Term Keys.
Kerberos.
Another Approach.
Session Keys from Long-Term Public Keys.
Diffie-Hellman Key Exchange.
Session Keys in SSL.
Protocol Design and Analysis.
Case Study.
Clogging Attacks.
ISAKMP Exchanges.
Key Refreshment.
Primes in OAKLEY.
Further Reading.
9. Communicating Securely After Key Setup.Protecting Information.
Encryption.
Authentication.
Which Layer Is Best for Security?
Encapsulation.
The Link Layer.
The Network Layer.
The Transport Layer.
The Application Layer.
Replay Prevention.
Case Study.
ESP.
AH.
Further Reading.
IV: PROTECTING AGAINST NETWORK THREATS.
10. Protecting a Network Perimeter.Insiders and Outsiders.
Network Perimeter.
Benefits of Firewalls.
Types of Firewalls.
Packet Filters.
Application-Level Gateways.
Using the Firewall.
Configuring Rules.
Web Server Placement.
Exit Control.
Remote Access8.
Logging in Directly.
Dial-up Access.
VPN Access.
Web-Only Access.
Case Study.
Further Reading.
11. Defending against Attacks.Bad Guys.
Mapping.
Attacks.
Denial of Service.
Defense.
Defending against Mapping.
Monitoring the Traffic.
Intrusion Detection.
Defense against DDOS.
Other Tools.
Case Study.
Further Reading.
V: COMMERCE AND PRIVACY.
12. Protecting E-Commerce Transactions.Credit Cards on the Web.
The SSL Protocol.
Protocol Overview.
Configuring a Browser.
Configuring a Server.
Security.
Performance.
Caching.
Case Study.
How Passport Works.
Risks of Passport.
Further Reading.
13. Protecting Privacy.Online Privacy.
What Is at Risk?
E-Mail Privacy.
Protecting E-Mail with Cryptography.
Anonymous E-Mail.
How Is Personal Privacy Compromised?
Direct Methods.
Indirect Methods.
Defense Mechanisms and Countermeasures.
Protecting Data on Your Machine.
Protecting Credit Card Information.
Safeguarding Your Browsing History.
Hiding Your Surfing.
Posting Anonymously to the Web.
Case Study.
Summary.
Further Reading.
Glossary.As a computer security expert at AT&T Labs, I often find myself meeting with members of IT departments of our large customers. This year, for example, I've met with, among others, the CIO of Ford Motor Company, the CTO of JP Morgan, and a Vice President of American Axle Manufacturing. In each case, they bring along an entourage of system administrators and other members of their team, and they come loaded with problems. How do I allow secure remote access to my site? How should I configure my firewall? How do employees store information securely on laptops? The list of questions goes on and on. I listen to them and offer my advice and expertise.
The customers always ask me what book I recommend to solve all of their problems. There are some good books on security out there. However, they are written from a disciplinary approach. There is usually a chapter on cryptography, a chapter on protocols, a chapter on SSL, and so on. So, I set out to write a book that directly answers the questions that these large IT departments face.
What sets this book apart from others is the problem-oriented approach. Each chapter starts out with a problem statement using Alice and sometimes Bob, borrowing these characters from the cryptography literature.
The book is divided into five parts. Each part is written to be self-contained, so there is some redundancy of information across parts. Within each part (except the first), there are chapters, each of which represents a problem. Within the chapter is a description of the threat model, explanations of the technologies involved, and some solutions. The chapters conclude with one or more case studies. The idea is to give the readers enough information to understand the problem in detail, to have the ability to evaluate solutions, and even to be able to solve the problem themselves.
The Surfer/End User Surfers or "end users" are those who surf the Web, read e-mail, and use computers in their everyday lives. They don't necessarily have any formal computer science training, but they are proficient in day-to-day uses of computers. For example, they know how to install software and how to change the settings in their browsers.
The IT Professional Information technology professionals are those who are quite knowledgeable about computers. They may be in charge of a large network deployment, programmers, system architects, or even managers. It is safe to assume that these people have a computer science or CIS degree, and that they have been working with computers for some time.
The Academic Academic are usually either professors or graduate students. Academics are usually interested in the technical details and the theory behind a solution, as much as in the solution itself. Academics are likely to consult other references to further understand the material, and the gory details are welcome, rather than feared.
The System Administrator System administrators are those who are often responsible for the security of a site. They are usually the ones putting out fires, and their jobs may be on the line if information is lost, or if a major break-in occurs. These people are interested in making sure that their systems are safe, and while they would normally love to study and understand the theory behind the solutions, there is no time for that. What they really want is to figure out exactly how to solve the problem that is pressing at the moment.
Each chapter in this book presents the solution to a problem that is important to some subset of these characters. While you may or may not fit exactly into one of these descriptions, I hope that the icons at the beginnings of the chapters will give you a good idea of what level of detail and complexity to expect when you read it.
There are five parts to the book:
Part I The first part is intended to motivate the rest of the book. No problems are identified here; rather, I address the issue of threat and why people need to worry about solving computer security problems.
Part II The second part deals with secure storage of information. The following problems are addressed:
Part III The third part is the most technical in the book. It deals with transferring information securely on vulnerable networks. The following problems are addressed:
Part IV The fourth part of this book has to do with protecting against network threats. This includes setting up firewalls, detecting intrusions, and dealing with denial-of-service attacks. The following problems are addressed:
Part V The fifth and final part of the book deals with online commerce and privacy. The part covers issues such as using credit cards on the Web and the privacy of Web browsing. The following problems are addressed:
There are several ways to read this book. If you are reading it because you have some of the problems mentioned here, then the best thing to do is to jump to the chapter that addresses your problem and read it. If it is in the middle of a part, you may find that some of the material in the earlier chapters is needed, so I recommend that you find the part that contains your problem and read that whole part.
If you are interested in learning about all of the problems, or security in general, then read the book from start to finish. There is no dependence on order in the parts, so you can read them in whatever order you like, but it is best to read the chapters within a part in the order they appear.
At the end of each chapter there is a listing of all of the references that are cited within the text. The books, articles, and Web sites are listed in the order that they appear. I have done my best to reference only Web sites that I expect to be around for a while, and I have tested all of them several times since I wrote each section, but of course, the Web is dynamic, so there are no guarantees. I maintain a Web site with all of the links in the book, and I keep it as up to date as possible. The URL is http://white-hat.org/. Please let me know if you find a broken link there. At the end of the book is the full bibliography listed by the numbers that are used for citation within the text.
There is a glossary of acronyms used throughout the book, so if you come across a term you do not understand, it may help to check there.
Avi Rubin"I can recommend this book to anybody who is novice in the world of computer security as it will provide you with a good clue what you're up against, and how to deal with it. For all of you out there seeking information about the security protocols and ciphers, also." - HelpNetSecurity 12/2001
Review 5/5 Star Rating: "This book by Dr. Aviel D. Rubin...is probably the best overall introduction to computer and security I've seen so far." - Swynk.com 12/2001
"Rubin's superior explanations make this an essential book to read whether to overcome a specific and immediate obstacle or to generate a security policy. [This book] provides an exceptional reference for anyone involved with system security, protection and defense." - Sys Admin Magazine
"As a researcher, Avi has produced excellent work in a number of areas, and is an engaging writer. With the vast new opportunities on the Internet come problems, complex and confusing. . . . This book considers many of these
problems, analyzes them, and presents fine solutions. More importantly, [Avi] presents approaches to the solutions, which generalize to related problems you will encounter. . . . A book like this is a tremendous aid."
--From the foreword by William R. Cheswick
"This is one of the most readable yet exhaustive books on a vital aspect of computer technology. All computer users, whether they be hackers, IT professionals, academics, or just lay users, will benefit from its content and derive pleasure from its clear and user-friendly style. Rubin has done a great service by identifying and explicating the complexities and subtleties of computer security."
--Jack Goldman, Ph.D., Founder of Xerox PARC
"White-Hat Security Arsenal is an enormously valuable toolkit for anyone who depends on the Internet today. It gives a refreshingly realistic and hype-free picture of the threats, with practical and up-to-date guidance not only on how to protect yourself, but on what to worry about if you don't."
--Matt Blaze, Ph.D., AT&T Labs-Research
"Avi's book has breadth and depth relating to information security defense needs. It tackles your shackles and threats in Nets with blistery history and constructive realism."
--Peter G. Neumann, Ph.D., Principal Scientist, Computer Science Lab, SRI International, author of Computer-Related Risks, moderator of the ACM Risks Forum
"Avi Rubin has done a stunning job of presenting the material and correctly stressing key points. . . . I can't wait to recommend this book to security folks in my own company and other companies with whom I am affiliated. It is extremely well done and offers many you-can-use-them-today insights."
--Sandra Henry-Stocker, Lead Systems Engineer, E Trade, and
Security Columnist, UNIX Insider
"White-Hat Security Arsenal is an intelligent, informative, and well-written book. It's one of the most readable computer science books I've ever picked up."
--Bruce Davie, Ph.D., Cisco Fellow, Cisco Systems, Inc., coauthor of
Computer Networks: A Systems Approach
"Avi's book examines commonly encountered security problems and offers sufficient insight for even the most lay computer user to appreciate the nature of threats and vulnerabilities associated with Internet-connected computers. But the book offers much more than basic diagnosis and treatment. More advanced network and security professionals should learn enough about the building blocks of security from this book to feel confident in designing, selecting, and implementing security systems and services."
--David M. Piscitello, Core Competence, Inc.
"An excellent resource for students and professionals wishing to learn about computer security. Each chapter directly delves into a specific branch of computer security. Rubin succinctly presents the main challenges and common solutions to each topic. Throughout the book the discussion is motivated by many entertaining real world examples. The reader is quickly exposed to various security blunders and cutting-edge systems designed to defend against such blunders. Overall, this book is fun to read and introduces the reader to all current techniques used in computer security."
--Dan Boneh, Ph.D., Computer Science Professor, Stanford University
"This book is not your standard how-to security book. This is a well-designed, well-written volume on just what the threats are, how they work, and what you have on hand to resist them. Viruses, worms, and denial of service attacks are just the beginning. Most interestingly, Rubin dissects the Morris Worm, Melissa, I Love You, and several other malicious invertebrates. His explanations of just how these infiltrative beasties work are just brilliant. This is a 'different' security book, and it's one you really need."
--Peter H. Salus, Ph.D., Chief Knowledge Officer, Matrix.Net, author of
A Quarter Century of UNIX and Casting the Net
"Avi Rubin does a great job of explaining the motivations behind many security solutions, as well as providing practical information about how you can solve real-world problems. White Hat Security Arsenal is an invaluable resource—a judicious mix of practical information and the theory behind it." —Marcus J. Ranum, CTO NFR Security, Inc.
"White-Hat Security Arsenal ups the ante for the good guys in the arms race against computer-based crime. Like a barrage of cruise missiles, Avi's excellent book attains air superiority by leveraging smarts and advanced GPS technology to zero in on critical targets. Intended to educate and inform information security professionals with a no-nonsense, hold-the-hype approach to security, this book is a critical weapon for modern information warriors. If you wear a white hat and are on the good guy's team, buy this book. Don't go into battle without it!" —Gary McGraw, Ph.D., CTO, Cigital
“[This book] tackles the difficult task of explaining technical details in a clear fashion very well…It is a helpful book supplemented with lots of short, good case studies and lots of relevant web site references. I am happy to recommend this book to hats of any color.” - Cipher: Electronic Newsletter of the IEEE Computer Society’s TCSP
“Rubin collects his experiences in the information security arena in this book and provides an excellent field guide to the fundamentals of securing computer systems against attack. Rubin gives a solid overview of each security problem…” - SecurityManagement.com
Praise for Aviel D. Rubin's White-Hat Security Arsenal
"As a researcher, Avi has produced excellent work in a number of areas, and is an engaging writer. With the vast new opportunities on the Internet come problems, complex and confusing.... This book considers many of these problems, analyzes them, and presents fine solutions. More importantly, [Avi] presents approaches to the solutions, which generalize to related problems you will encounter.... A book like this is a tremendous aid."
-From the foreword by William R. Cheswick
"This is one of the most readable yet exhaustive books on a vital aspect of computer technology. All computer users, whether they be hackers, IT professionals, academics, or just lay users, will benefit from its content and derive pleasure from its clear and user-friendly style. Rubin has done a great service by identifying and explicating the complexities and subtleties of computer security."
-Jack Goldman, Ph.D., Founder of Xerox PARC
"White-Hat Security Arsenal is an enormously valuable toolkit for anyone who depends on the Internet today. It gives a refreshingly realistic and hype-free picture of the threats, with practical and up-to-date guidance not only on how to protect yourself, but on what to worry about if you don't."
-Matt Blaze, Ph.D., AT&T Labs-Research
"Avi's book has breadth and depth relating to information security defense needs. It tackles your shackles and threats in Nets with blistery history and constructive realism."
-Peter G. Neumann, Ph.D., Principal Scientist, Computer Science Lab, SRI International, author of Computer-Related Risks, moderator of the ACM Risks Forum
"Avi Rubin has done a stunning job of presenting the material and correctly stressing key points.... I can't wait to recommend this book to security folks in my own company and other companies with whom I am affiliated. It is extremely well done and offers many you-can-use-them-today insights."
-Sandra Henry-Stocker, Lead Systems Engineer, E-Trade, and Security Columnist, UNIX Insider
"White-Hat Security Arsenal is an intelligent, informative, and well-written book. It's one of the most readable computer science books I've ever picked up."
-Bruce Davie, Ph.D., Cisco Fellow, Cisco Systems, Inc., coauthor of Computer Networks: A Systems Approach
"Avi's book examines commonly encountered security problems and offers sufficient insight for even the most lay computer user to appreciate the nature of threats and vulnerabilities associated with Internet-connected computers. But the book offers much more than basic diagnosis and treatment. More advanced network and security professionals should learn enough about the building blocks of security from this book to feel confident in designing, selecting, and implementing security systems and services."
-David M. Piscitello, Core Competence, Inc.
"An excellent resource for students and professionals wishing to learn about computer security. Each chapter directly delves into a specific branch of computer security. Rubin succinctly presents the main challenges and common solutions to each topic. Throughout the book the discussion is motivated by many entertaining real-world examples. The reader is quickly exposed to various security blunders and cutting-edge systems designed to defend against such blunders. Overall, this book is fun to read and introduces the reader to all current techniques used in computer security."
-Dan Boneh, Ph.D., Computer Science Professor, Stanford University
"This book is not your standard how-to security book. This is a well-designed, well-written volume on just what the threats are, how they work, and what you have on hand to resist them. Viruses, worms, and denial of service attacks are just the beginning. Most interestingly, Rubin dissects the Morris Worm, Melissa, I Love You, and several other malicious invertebrates. His explanations of just how these infiltrative beasties work are just brilliant. This is a 'different' security book, and it's one you really need."
-Peter H. Salus, Ph.D., Chief Knowledge Officer, Matrix.Net, author of A Quarter Century of UNIX and Casting the Net
Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.
This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.
To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:
For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.
For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.
Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.
Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.
If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.
On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.
We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.
Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.
Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.
This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.
This site currently does not respond to Do Not Track signals.
Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.
This site is not directed to children under the age of 13.
Pearson may send or direct marketing communications to users, provided that
Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.
If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.
Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.
Pearson does not rent or sell personal information in exchange for any payment of money.
While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.
California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.
Pearson may disclose personal information, as follows:
This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.
Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.
We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.
Last Update: November 17, 2020