Home>Store

Cloud Computing: Concepts, Technology & Architecture

Register your productto gain access to bonus material or receive a coupon.

Cloud Computing: Concepts, Technology & Architecture

Best Value Purchase

Book + eBook Bundle

  • Your Price: $59.39
  • List Price: $98.98
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from yourAccountpage after purchase:

    ePubEPUBThe open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe ReaderPDFThe popular standard, used most often with the freeAdobe® Reader®software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

More Purchase Options

Book

  • Your Price: $43.99
  • List Price: $54.99
  • Usually ships in 24 hours.

eBook (Watermarked)

  • Your Price: $35.19
  • List Price: $43.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from yourAccountpage after purchase:

    ePubEPUBThe open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe ReaderPDFThe popular standard, used most often with the freeAdobe® Reader®software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

About

Features

  • Instructor resources including chapter-by-chapter PowerPoint Presentation and an Instructor's Guide
  • Structured format and breakdown of cloud computing technologies and models into well-defined components, concepts, and mechanisms makes it ideal for classroom study
  • Clean separation of cloud computing topics within book by chapter make for suitable individual lessons or seminars by instructor
  • Provides well-researched and well-defined coverage from an industry-centric and vendor-neutral perspective

Description

  • Copyright 2013
  • Dimensions: 7" x 9-1/8"
  • Pages: 528
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-338752-6
  • ISBN-13: 978-0-13-338752-0

云是分布式技术平台,leverage sophisticated technology innovations to provide highly scalable and resilient environments that can be remotely utilized by organizations in a multitude of powerful ways. To successfully build upon, integrate with, or even create a cloud environment requires an understanding of its common inner mechanics, architectural layers, and models, as well as an understanding of the business and economic factors that result from the adoption and real-world use of cloud-based services.

InCloud Computing: Concepts, Technology & Architecture, Thomas Erl, one of the world’s top-selling IT authors, teams up with cloud computing experts and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, models, technology mechanisms, and technology architectures, all from an industry-centric and vendor-neutral point of view. In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing platforms and solutions.

Subsequent to technology-centric coverage, the book proceeds to establish business-centric models and metrics that allow for the financial assessment of cloud-based IT resources and their comparison to those hosted on traditional IT enterprise premises. Also provided are templates and formulas for calculating SLA-related quality-of-service values and numerous explorations of the SaaS, PaaS, and IaaS delivery models.

With more than 260 figures, 29 architectural models, and 20 mechanisms, this indispensable guide provides a comprehensive education of cloud computing essentials that will never leave your side.

Downloads

Downloads

Readers can download JPGs to this book.

JPGs for Parts 1 and 2 are:here

jpg 3到5部分:here

Extras

Related Article

Back Off, Bub! A Short Guide to Robust Client/Server Connection Architecture

Author's Site

Please visit the author sitehere.

Sample Content

Online Sample Chapter

Fundamental Cloud Architectures

Sample Pages

Download the sample pages(includes Chapter 3 and Index)

Table of Contents

Foreword xxix

Acknowledgments xxxiii

CHAPTER 1: Introduction 1

1.1 Objectives of This Book3

1.2 What This Book Does Not Cover4

1.3 Who This Book Is For4

1.4 How This Book Is Organized4

1.5 Conventions9

Symbols and Figures9

Summary of Key Points9

1.6 Additional Information9

Updates, Errata, and Resources (www.servicetechbooks.com)9

Referenced Specifications (www.servicetechspecs.com)10

The Service Technology Magazine (www.servicetechmag.com)10

International Service Technology Symposium (www.servicetechsymposium.com)10

What Is Cloud? (www.whatiscloud.com)10

What Is REST? (www.whatisrest.com)10

Cloud Computing Design Patterns (www.cloudpatterns.org)10

Service-Orientation (www.serviceorientation.com)11

CloudSchool.com Certified Cloud (CCP) Professional (www.cloudschool.com)11

SOASchool.com SOA Certified (SOACP) Professional (www.soaschool.com)11

Notification Service11

CHAPTER 2: Case Study Background 13

2.1 Case Study #1: ATN14

Technical Infrastructure and Environment14

Business Goals and New Strategy15

Roadmap and Implementation Strategy15

2.2 Case Study #2: DTGOV16

Technical Infrastructure and Environment17

Business Goals and New Strategy18

Roadmap and Implementation Strategy19

2.3 Case Study #3: Innovartus Technologies Inc20

Technical Infrastructure and Environment20

业务目标和策略20

Roadmap and Implementation Strategy21

PART I: FUNDAMENTAL CLOUD COMPUTING

CHAPTER 3: Understanding Cloud Computing 25

3.1 Origins and Influences26

A Brief History26

Definitions27

Business Drivers28

Capacity Planning28

Cost Reduction29

Organizational Agility30

Technology Innovations30

Clustering31

Grid Computing31

Virtualization32

Technology Innovations vs. Enabling Technologies32

3.2 Basic Concepts and Terminology33

Cloud33

IT Resource34

On-Premise36

Cloud Consumers and Cloud Providers36

Scaling37

Horizontal Scaling37

Vertical Scaling37

Cloud Service38

Cloud Service Consumer40

3.3 Goals and Benefits40

Reduced Investments and Proportional Costs41

Increased Scalability42

Increased Availability and Reliability43

3.4 Risks and Challenges45

Increased Security Vulnerabilities45

Reduced Operational Governance Control45

Limited Portability Between Cloud Providers47

Multi-Regional Compliance and Legal Issues48

CHAPTER 4: Fundamental Concepts and Models 51

4.1 Roles and Boundaries52

Cloud Provider52

Cloud Consumer52

Cloud Service Owner53

Cloud Resource Administrator54

额外的角色56

Organizational Boundary56

Trust Boundary57

4.2 Cloud Characteristics58

On-Demand Usage59

Ubiquitous Access59

Multitenancy (and Resource Pooling)59

Elasticity61

Measured Usage61

Resiliency61

4.3 Cloud Delivery Models63

Infrastructure-as-a-Service (IaaS)64

Platform-as-a-Service (PaaS)65

Software-as-a-Service (SaaS)66

Comparing Cloud Delivery Models67

Combining Cloud Delivery Models69

IaaS + PaaS69

IaaS + PaaS + SaaS72

4.4 Cloud Deployment Models73

Public Clouds73

Community Clouds74

Private Clouds75

Hybrid Clouds77

Other Cloud Deployment Models78

CHAPTER 5: Cloud-Enabling Technology 79

5.1 Broadband Networks and Internet Architecture80

Internet Service Providers (ISPs)80

Connectionless Packet Switching (Datagram Networks)83

Router-Based Interconnectivity83

Physical Network84

Transport Layer Protocol84

Application Layer Protocol85

Technical and Business Considerations85

Connectivity Issues85

Network Bandwidth and Latency Issues88

Cloud Carrier and Cloud Provider Selection89

5.2 Data Center Technology90

Virtualization90

Standardization and Modularity90

Automation91

Remote Operation and Management92

High Availability92

Security-Aware Design, Operation, and Management92

Facilities92

Computing Hardware93

Storage Hardware93

Network Hardware95

Carrier and External Networks Interconnection95

Web-Tier Load Balancing and Acceleration95

LAN Fabric95

SAN Fabric95

NAS Gateways95

Other Considerations96

5.3 Virtualization Technology97

Hardware Independence98

Server Consolidation98

Resource Replication98

Operating System-Based Virtualization99

Hardware-Based Virtualization101

Virtualization Management102

Other Considerations102

5.4 Web Technology103

Basic Web Technology104

Web Applications104

5.5 Multitenant Technology106

5.6 Service Technology108

Web Services109

REST Services110

Service Agents111

Service Middleware112

5.7 Case Study Example113

CHAPTER 6: Fundamental Cloud Security 117

6.1 Basic Terms and Concepts118

进行dentiality118

Integrity119

Authenticity119

Availability119

Threat120

Vulnerability120

Risk120

Security Controls120

Security Mechanisms121

Security Policies121

6.2 Threat Agents121

Anonymous Attacker122

Malicious Service Agent123

Trusted Attacker123

Malicious Insider123

6.3 Cloud Security Threats124

Traffic Eavesdropping124

Malicious Intermediary124

Denial of Service126

Insufficient Authorization127

Virtualization Attack127

Overlapping Trust Boundaries129

6.4 Additional Considerations131

Flawed Implementations131

Security Policy Disparity132

Contracts132

Risk Management133

6.5 Case Study Example135

PART II: CLOUD COMPUTING MECHANISMS

CHAPTER 7: Cloud Infrastructure Mechanisms 139

7.1 Logical Network Perimeter140

Case Study Example142

7.2 Virtual Server144

Case Study Example145

7.3 Cloud Storage Device149

Cloud Storage Levels149

Network Storage Interfaces150

Object Storage Interfaces151

Database Storage Interfaces151

Relational Data Storage151

Non-Relational Data Storage152

Case Study Example152

7.4 Cloud Usage Monitor155

Monitoring Agent155

Resource Agent155

Polling Agent157

Case Study Example157

7.5 Resource Replication161

Case Study Example162

7.6 Ready-Made Environment166

Case Study Example167

CHAPTER 8: Specialized Cloud Mechanisms 169

8.1 Automated Scaling Listener170

Case Study Example172

8.2 Load Balancer176

Case Study Example177

8.3 SLA Monitor178

Case Study Example180

SLA Monitor Polling Agent180

SLA Monitoring Agent180

8.4 Pay-Per-Use Monitor184

Case Study Example187

8.5 Audit Monitor189

Case Study Example189

8.6 Failover System191

Active-Active191

Active-Passive194

Case Study Example196

8.7 Hypervisor200

Case Study Example201

8.8 Resource Cluster203

Case Study Example206

8.9 Multi-Device Broker208

Case Study Example209

8.10 State Management Database210

Case Study Example211

CHAPTER 9: Cloud Management Mechanisms 213

9.1 Remote Administration System214

Case Study Example219

9.2 Resource Management System219

Case Study Example221

9.3 SLA Management System222

Case Study Example224

9.4 Billing Management System225

Case Study Example227

CHAPTER 10: Cloud Security Mechanisms 229

10.1加密230

Symmetric Encryption231

Asymmetric Encryption231

Case Study Example233

10.2 Hashing234

Case Study Example235

10.3 Digital Signature236

Case Study Example238

10.4 Public Key Infrastructure (PKI)240

Case Study Example242

10.5 Identity and Access Management (IAM)243

Case Study Example244

10.6 Single Sign-On (SSO)244

Case Study Example246

10.7 Cloud-Based Security Groups247

Case Study Example249

10.8 Hardened Virtual Server Images251

Case Study Example252

PART III: CLOUD COMPUTING ARCHITECTURE

CHAPTER 11: Fundamental Cloud Architectures 255

11.1 Workload Distribution Architecture256

11.2 Resource Pooling Architecture257

11.3 Dynamic Scalability Architecture262

11.4 Elastic Resource Capacity Architecture265

11.5 Service Load Balancing Architecture268

11.6 Cloud Bursting Architecture271

11.7 Elastic Disk Provisioning Architecture272

11.8 Redundant Storage Architecture275

11.9 Case Study Example277

CHAPTER 12: Advanced Cloud Architectures 281

12.1 Hypervisor Clustering Architecture282

12.2 Load Balanced Virtual Server Instances Architecture288

12.3 Non-Disruptive Service Relocation Architecture293

12.4 Zero Downtime Architecture298

12.5 Cloud Balancing Architecture299

12.6 Resource Reservation Architecture301

12.7 Dynamic Failure Detection and Recovery Architecture306

12.8 Bare-Metal Provisioning Architecture309

12.9 Rapid Provisioning Architecture312

12.10 Storage Workload Management Architecture315

12.11 Case Study Example321

CHAPTER 13: Specialized Cloud Architectures 323

13.1 Direct I/O Access Architecture324

13.2 Direct LUN Access Architecture326

13.3 Dynamic Data Normalization Architecture329

13.4 Elastic Network Capacity Architecture330

13.5 Cross-Storage Device Vertical Tiering Architecture332

13.6 Intra-Storage Device Vertical Data Tiering Architecture337

13.7 Load Balanced Virtual Switches Architecture340

13.8 Multipath Resource Access Architecture342

13.9 Persistent Virtual Network Configuration Architecture344

13.10 Redundant Physical Connection for Virtual Servers Architecture347

13.11 Storage Maintenance Window Architecture350

PART IV: WORKING WITH CLOUDS

CHAPTER 14: Cloud Delivery Model Considerations 359

14.1 Cloud Delivery Models: The Cloud Provider Perspective360

Building IaaS Environments360

Data Centers361

Scalability and Reliability363

Monitoring363

Security364

Equipping PaaS Environments364

Scalability and Reliability365

Monitoring367

Security367

Optimizing SaaS Environments367

Security370

14.2 Cloud Delivery Models: The Cloud Consumer Perspective370

Working with IaaS Environments370

IT Resource Provisioning Considerations372

Working with PaaS Environments373

IT Resource Provisioning Considerations373

Working with SaaS Services374

14.3 Case Study Example375

CHAPTER 15: Cost Metrics and Pricing Models 379

15.1 Business Cost Metrics380

Up-Front and On-Going Costs380

Additional Costs381

Case Study Example382

Product Catalog Browser382

On-Premise Up-Front Costs382

On-Premise On-Going Costs383

Cloud-Based Up-Front Costs383

Cloud-Based On-Going Costs383

Client Database385

On-Premise Up-Front Costs385

On-Premise On-Going Costs385

Cloud-Based Up-Front Costs385

Cloud-Based On-Going Costs385

15.2 Cloud Usage Cost Metrics387

Network Usage387

Inbound Network Usage Metric387

Outbound Network Usage Metric388

Intra-Cloud WAN Usage Metric388

Server Usage389

On-Demand Virtual Machine Instance Allocation Metric389

Reserved Virtual Machine Instance Allocation Metric389

Cloud Storage Device Usage390

On-Demand Storage Space Allocation Metric390

I/O Data Transferred Metric390

Cloud Service Usage390

Application Subscription Duration Metric390

Number of Nominated Users Metric391

Number of Transactions Users Metric391

15.3 Cost Management Considerations391

Pricing Models393

Additional Considerations395

Case Study Example396

Virtual Server On-Demand Instance Allocation397

Virtual Server Reserved Instance Allocation399

Cloud Storage Device401

WAN Traffic401

CHAPTER 16: Service Quality Metrics and SLAs 403

16.1 Service Quality Metrics404

Service Availability Metrics405

Availability Rate Metric405

Outage Duration Metric406

Service Reliability Metrics407

Mean-Time Between Failures (MTBF) Metric407

Reliability Rate Metric407

Service Performance Metrics407

Network Capacity Metric408

Storage Device Capacity Metric408

Server Capacity Metric408

Web Application Capacity Metric408

Instance Starting Time Metric409

Response Time Metric409

Completion Time Metric409

Service Scalability Metrics409

Storage Scalability (Horizontal) Metric410

Server Scalability (Horizontal) Metric410

Server Scalability (Vertical) Metric410

Service Resiliency Metrics411

Mean-Time to Switchover (MTSO) Metric411

Mean-Time System Recovery (MTSR) Metric412

16.2 Case Study Example412

16.3 SLA Guidelines413

16.4 Case Study Example416

Scope and Applicability416

Service Quality Guarantees416

Definitions417

Usage of Financial Credits417

SLA Exclusions418

PART V: APPENDICES

Appendix A: Case Study Conclusions 421

A.1 ATN422

A.2 DTGOV422

A.3 Innovartus424

附录B:行业标准或ganizations 427

B.1 National Institute of Standards and Technology (NIST)428

B.2 Cloud Security Alliance (CSA)429

B.3 Distributed Management Task Force (DMTF)429

B.4 Storage Networking Industry Association (SNIA)430

B.5 Organization for the Advancement of Structured Information Standards (OASIS)430

B.6 The Open Group430

B.7 Open Cloud Consortium (OCC)431

B.8 European Telecommunications Standards Institute (ETSI)431

B.9 Telecommunications Industry Association (TIA)431

B.10 Liberty Alliance432

B.11 Open Grid Forum (OGF)432

Appendix C: Mapping Mechanisms to Characteristics 433

Appendix D: Data Center Facilities (TIA-942) 437

D.1 Primary Rooms438

Electrical Room438

Mechanical Room438

Storage and Staging438

Offices, Operations Center, and Support438

Telecommunications Entrance438

Computer Room439

D.2 Environmental Controls440

External Electrical Power Provider Interconnection440

Power Distribution441

Uninterruptible Power Source (UPS)441

Power Engine-Generator441

D.3 Infrastructure Redundancy Summary442

Appendix E: Emerging Technologies 443

E.1 Autonomic Computing444

E.2 Grid Computing445

Service Grids446

Appendix F: Cloud Provisioning Contracts 449

F.1 Cloud Provisioning Contract Structure450

Terms of Service452

Service Usage Policy452

Security and Privacy Policy453

Warranties and Liabilities455

Rights and Responsibilities455

Termination and Renewal456

Specifications and SLAs456

Pricing and Billing457

Other Issues457

Legal and Compliance Issues457

Auditability and Accountability457

Changes in the Contract Terms and Conditions457

F.2 Cloud Provider Selection Guidelines458

Cloud Provider Viability458

Appendix G: Cloud Business Case Template 461

G.1 Business Case Identification462

G.2 Business Needs462

G.3 Target Cloud Environment463

G.4 Technical Issues464

G.5 Economic Factors464

About the Authors 465

About the Foreword Contributor 467

About the Contributors 469

Index 471

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simplyemailinformation@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through ourContact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on theAccount page. If a user no longer desires our service and desires to delete his or her account, please contact us atcustomer-service@informit.com我们将删除用户的accou过程nt.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive:www.e-skidka.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information toNevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read ourSupplemental privacy statement for California residentsin conjunction with this Privacy Notice. TheSupplemental privacy statement for California residentsexplains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • 个人的同意(或他们的括弧t, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Pleasecontact usabout this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020