Home>Store

DB2 Essentials: Understanding DB2 in a Big Data World, 3rd Edition

Register your productto gain access to bonus material or receive a coupon.

DB2 Essentials: Understanding DB2 in a Big Data World, 3rd Edition

eBook (Watermarked)

  • Your Price: $41.59
  • List Price: $51.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from yourAccountpage after purchase:

    ePubEPUBThe open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe ReaderPDFThe popular standard, used most often with the freeAdobe® Reader®software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Description

  • Copyright 2014
  • Dimensions: 7" x 9-1/8"
  • Edition: 3rd
  • eBook (Watermarked)
  • ISBN-10: 0-13-346194-7
  • ISBN-13: 978-0-13-346194-7

The Easy, Visual Introduction to IBM DB2 Version 10.5 for Linux, UNIX, and Windows

Foreword by Judy Huber, Vice President, Distributed Data Servers and Data Warehousing; Director, IBM Canada Laboratory

This book covers everything you need to get productive with the latest version of IBM DB2 and apply it to today’s business challenges. It discusses key features introduced in DB2 Versions 10.5, 10.1, and 9.7, including improvements in manageability, integration, security, Big Data support, BLU Acceleration, and cloud computing.

DB2 Essentialsilluminates key concepts with examples drawn from the authors’ extensive experience with DB2 in enterprise environments. Raul F. Chong and Clara Liu explain how DB2 has evolved, what’s new, and how to choose the right products, editions, and tools. Next, they walk through installation, configuration, security, data access, remote connectivity, and day-to-day administration.

Each chapter starts with an illustrative overview to introduce its key concepts using a big picture approach. Clearly explained figures are used extensively, and techniques are presented with intuitive screenshots, diagrams, charts, and tables. Case studies illustrate how “theory” is applied in real-life environments, and hundreds of review questions help you prepare for IBM’s newest DB2 certification exams.

Coverage includes
• Understanding the role of DB2 in Big Data
• Preparing for and executing a smooth installation or upgrade
• Understanding the DB2 environment, instances, and databases
• Configuring client and server connectivity
• Working with database objects
• Getting started with BLU Acceleration
• Implementing security: authentication and authorization
• Understanding concurrency and locking
• Maintaining, backing up, and recovering data
• Using basic SQL in DB2 environments
• Diagnosing and solving DB2 problems

This book is for anyone who plans to work with DB2, including DBAs, system administrators, developers, and consultants. It will be a great resource whether you’re upgrading from an older version of DB2, migrating from a competitive database, or learning your first database platform.


Sample Content

Table of Contents

Foreword xxiv
Chapter 1 Introduction to DB2
A Brief History of DB2: From Past to Present 1
The Role of DB2 in the Big Data World 3
Characteristics of Big Data 4
Types of Big Data 5
The IBM Big Data Platform 6
Integration of DB2 with BigInsights (Hadoop) 11
DB2 Editions 13
DB2 Express-C 15
DB2 Express Server Edition 16
DB2 Workgroup Server Edition 16
DB2 Enterprise Server Edition 16
DB2 Advanced Workgroup Server Edition 17
DB2 Advanced Enterprise Server Edition 17
DB2 Developer Edition 18
DB2 Advanced Recovery Feature 18
IBM Data Server Clients and Driver Packages 19
Mainframe Host Connectivity 20
Database Federation Support 21
Database Replication Support 21
DB2 Syntax Diagram Conventions 23
Case Study 26
Summary 28
Review Questions 28

Chapter 2 DB2 at a Glance: The Big Picture 31
SQL Statements, XQuery Statements, and DB2 Commands 32
SQL Statements 33
XQuery Statements 34
DB2 System Commands 36
DB2 Command Line Processor (CLP) Commands 36
DB2 Command Line Processor Plus (CLPPlus) Commands 37
DB2 Text Search Commands 37
Database Tools and Utilities 38
Command-Line Tools 39
IBM Data Studio 39
Design, Configuration, Tuning, and Monitoring Tools 42
Setup Tools 42
Information Tools 43
The DB2 Environment 43
An Instance 44
The Database Administration Server 45
DB2 Profile Registries and DB2 Configuration Files 45
Connectivity and DB2 Directories 49
Databases 51
Table Spaces 52
Tables, Indexes, and Large Objects 53
Database Transaction Logs 53
Buffer Pools 53
Storage Groups 53
Directory Structure of Your DB2 Environment 53
Database Partitioning 57
Database Partitions 58
The Node Configuration File 62
An Instance in the DB2 Database Partitioning Environment 64
Partitioning a Database 65
The Catalog Partition 67
Partition Groups 67
Buffer Pools in a DB2 Database Partitioning Environment 68
Table Spaces in a Partitioned Database Environment 69
The Coordinator Partition 69
Issuing Commands and SQL Statements in a Database Partitioned Environment 69
The DB2NODE Environment Variable 70
Distribution Maps and Distribution Keys 71
DB2 pureScale 72
DB2 pureScale Architecture Overview 73
Cluster Interconnect 74
Cluster Caching Facility (CF) 75
DB2 Cluster Services (CS) 75
Cluster File System 75
DB2 pureScale Instance 76
Database Federation 78
Use of Uppercase Versus Lowercase in DB2 80
Case Study 83
Summary 85
Review Questions 85

Chapter 3 Installing DB2 89
DB2 Installation: The Big Picture 90
DB2 Installation System Requirements 94
Installing DB2 Using the DB2 Setup Wizard 95
Launch the DB2 Setup Wizard on Windows 96
Launch the DB2 Setup Wizard on Linux and UNIX 97
Generate a Response File 97
Select Features to Be Installed 98
Specify a Unique DB2 Copy Name 99
Set User Information for the DB2 Administration Server 99
Create and Configure the DB2 Instance 99
Enable Operating System Security for DB2 Objects (Windows Only) 100
Review Installation Settings and Start the Installation 101
Root and Non-Root Installation on Linux and UNIX 101
Limitations of Non-Root Installations 102
Installing DB2 with a Non-Root User 103
Enabling Some Root-Based Features in Non-Root Installations 103
Required User IDs and Groups 105
User IDs and Groups Required for Windows 105
User IDs and Groups Required for Linux and UNIX 106
Silent Install Using a Response File 107
Creating a Response File Using the DB2 Setup Wizard 109
Installing DB2 Using a Response File on Windows 112
Installing DB2 Using a Response File on Linux and UNIX 112
Advanced DB2 Installation Methods (Linux and UNIX Only) 113
Installing DB2 Using the db2_install Script 113
手动安装ling the DB2 Payload Files 115
Installing a DB2 License 116
Reducing DB2 Product Installation Image Size 118
Customizing DB2 Installation Images 118
Installing DB2 Using a Pruned Installation Image 120
Installing Multiple DB2 Versions and Fix Packs on the Same Server 121
共存的多个DB2版本和补丁包(Windows) 121
共存的多个DB2版本和补丁包(Linux and UNIX) 124
The db2ls Command (Linux and UNIX) 124
DB2 Administrative Server (DAS) and Multiple DB2 Copies 126
Installing DB2 Fix Packs 126
Applying Fix Packs to a Non-Root Installation 128
Upgrading to the Latest DB2 Version 128
Case Study 1 128
Case Study 2 130
Summary 132
Review Questions 132

Chapter 4 Using Database Tools and Utilities 137
Database Tools: The Big Picture 137
The Command-Line Tools 138
The DB2 Command Window 139
The DB2 Command Line Processor 141
The DB2 Command Line Processor Plus 154
IBM Data Studio 160
IBM Data Studio Workspace and the Task Launcher 161
Connection Profiles 162
General Database Administration Tools 164
General Database Development Tools 171
IBM Data Studio Web Console 174
Set-Up Tools 175
Configure DB2 .NET Data Provider 176
First Steps 176
Default DB2 and Database Client Interface Selection Wizard 177
The Replication Center 178
Information Tools 178
DB2 Information Center 179
Checking for DB2 Updates 180
问题Determination Tools 180
The db2pd Tool 181
Case Study 1 181
Case Study 2 182
Summary 183
Review Questions 184

Chapter 5 Understanding the DB2 Environment, DB2 Instances, and Databases 187
The DB2 Environment, DB2 Instances, and Databases: The Big Picture 187
The DB2 Environment 188
The DB2 Instance 198
Creating DB2 Instances 200
Creating Client Instances 201
Creating DB2 Instances in a pureScale Environment 202
Dropping an Instance 202
Listing the Instances in Your System 203
Using the DB2INSTANCE Environment Variable 204
Starting a DB2 Instance 204
Stopping a DB2 Instance 207
Attaching to an Instance 208
Configuring an Instance 209
Working with an Instance from IBM Data Studio 214
Using the DB2 Commands at the Instance Level 216
The Database Administration Server (DAS) 216
Using the DAS Commands 217
Configuring a Database 217
Configuring a Database from IBM Data Studio 223
Using the DB2 Commands at the Database Level 226
The Configuration Advisor 226
Design Considerations for Instances and Databases 228
Case Study 229
Summary 231
Review Questions 232

Chapter 6 Configuring Client and Server Connectivity 235
Client and Server Connectivity: The Big Picture 235
The DB2 Database Directories 237
The DB2 Database Directories: An Analogy Using a Book 238
The System Database Directory 239
The Local Database Directory 241
The Node Directory 242
The Database Connection Services Directory 244
The Relationship Between the DB2 Directories 245
Supported Connectivity Scenarios 249
Scenario 1: Local Connection from a Data Server Client to a DB2 Server 249
Scenario 2: Remote Connection from a Data Server Client to a DB2 Server 251
Scenario 3: Remote Connection from a Data Server Client to a DB2 Host Server 258
Scenario 4: Remote Connection from a Data Server Client to a DB2 Host Server via a DB2 Connect Gateway 262
Scenario 5: Remote Connection from an Application to a DB2 Server 264
DB2 Packages and the Bind Process 265
Automatic Client Reroute Feature 267
Application Connection Timeout Support 268
TCP/IP Keepalive Timeout Support 269
Diagnosing DB2 Connectivity Problems 269
Diagnosing Client-Server TCP/IP Connection Problems 270
Case Study 278
Step 1: Configure the DB2 Connect Gateway Machine 278
Step 2: Test the Connection from the DB2 Connect Gateway Machine to the Host 278
Step 3: Enable the TCP/IP Listener on the Gateway Machine 279
Step 4: Configure a Data Server Client to Connect to the Host via the Gateway 279
Summary 280
Review Questions 281

Chapter 7 Working with Database Objects 285
Database Objects: The Big Picture 285
Databases 290
Database Partitions 290
Automatic Storage 296
Creating a Database 297
Default Database Objects Created 299
Listing Databases 300
Dropping Databases 300
Database Creation Examples 300
The SAMPLE Database 304
Partition Groups 305
Database Partition Group Classifications 305
Default Partition Groups 306
Creating Database Partition Groups 307
Modifying a Database Partition Group 308
Listing Database Partition Groups 308
Dropping a Database Partition Group 310
Table Spaces 310
Table Space Classification 310
Default Table Spaces 311
Containers 312
Storage Groups 312
Pages 315
Extents 315
Creating Table Spaces 317
SMS Table Spaces 318
DMS Table Spaces 320
322年自动存储表空间管理
Comparing SMS, DMS, and Automatic Storage Table Spaces 323
Listing Table Spaces 324
Altering a Table Space 325
Dropping a Table Space 325
Buffer Pools 326
Creating Buffer Pools 326
Altering Buffer Pools 329
Dropping Buffer Pools 330
Schemas 330
Data Types 332
DB2 Built-in Data Types 332
User-Defined Types (UDTs) 337
Choosing the Proper Data Type 338
Tables 339
Table Classification 339
System Catalog Tables 340
User Tables 341
Default Values 344
Using NULL Values 346
Identity Columns 347
Constraints 350
Not Logged Initially Tables 362
Partitioned Tables 363
Row Compression 366
Table Compression 369
马特里alized Query Tables and Summary Tables 370
Temporary Tables 370
Temporal Tables and Time Travel Query 372
Indexes 379
Working with Indexes 379
Clustering Indexes 382
Multidimensional Clustering (MDC) Tables and Block Indexes 383
MDC Tables 384
Block Indexes 385
The Block Map 387
Choosing Dimensions for MDC Tables 388
Combining Database Partitioning, Table Partitioning, and MDC 388
Views 389
View Classification 391
Using the WITH CHECK OPTION 394
Nested Views 395
Packages 395
Triggers 396
Stored Procedures 397
User-Defined Functions 400
Sequences 401
Modules 403
Case Study 1 404
Case Study 2 407
Summary 408
Review Questions 409

Chapter 8 Implementing Security 415
DB2 Security Model: The Big Picture 415
Authentication Methods 417
Configuring the Authentication Type at a DB2 Server 417
Configuring the Authentication Type at a DB2 Client 419
Authenticating Users at the DB2 Server 421
Authenticating Users Using the Kerberos Security Service 423
Authenticating Users with Generic Security Service Plug-ins 424
Authenticating Users at the Data Server Client 427
Administrative Authorities 431
Managing Administrative Authorities 433
Database Object Privileges 438
Schema Privileges 438
Table Space Privileges 440
Table and View Privileges 441
Index Privileges 444
Package Privileges 445
Routine Privileges 446
Sequence Privileges 448
Security Label Privileges 449
SET SESSION AUTHORIZATION Statement and SETSESSIONUSER Privilege 450
Implicit Privileges 452
Roles and Privileges 453
TRANSFER OWNERSHIP Statement 456
Data Encryption 456
Label-Based Access Control (LBAC) 458
Views and LBAC 462
Implementing an LBAC Security Solution 462
LBAC in Action 465
Column Level Security and Referential Integrity 466
Row and Column Access Control (RCAC) 467
Built-In SQL Functions and Session Variables Supporting RCAC 468
Creating Row Permissions 469
Creating Column Masks 471
Enforcing Row Permissions and Column Masks 472
Behavior of INSERT, DELETE, and UPDATE Under RCAC 473
Implementing a RCAC Security Solution 473
RCAC in Action 475
Extending the Case Scenario 476
Benefits of Using RCAC 478
Trusted Contexts 479
Windows Security Considerations 481
Windows Domain Considerations 481
Windows Extended Security 483
Authority and Privilege Metadata 484
Case Study 486
Working with Authorities and Privileges 486
Working with Data Encryption, Ownership Transfer, and Roles 491
Working with RCAC 492
Summary 493
Review Questions 494

Chapter 9 Understanding Concurrency and Locking 499
DB2 Locking and Concurrency: The Big Picture 500
Concurrency and Locking Scenarios 500
Lost Updates 501
Uncommitted Reads 502
Nonrepeatable Reads 503
Phantom Reads 504
DB2 Isolation Levels 504
Uncommitted Reads 504
Cursor Stability 505
Read Stability 510
Repeatable Reads 511
Changing Isolation Levels 512
Using the DB2 Command Window 512
Using the DB2 precompile and bind Commands 514
Using the DB2 Call Level Interface 514
Using the Application Programming Interface 516
Working with Statement Level Isolation Level 516
DB2 Locking 517
Lock Attributes 518
Lock Waits 524
Deadlocks 526
Lock Deferral 527
Lock Escalation 528
Diagnosing Lock Problems 529
使用应用程序列表命令529
Using the force application Command 531
Using the Snapshot Monitor 532
Using Snapshot Table Functions 536
使用536年事件监视器
Techniques to Avoid Locking 536
Case Study 538
练习539
Setup 539
第1部分:测试隔离CS 542 CC
Part 2: Different Access Paths, Different Locking 543
Part 3: Simulating a Deadlock Situation 544
Part 4: Testing Isolation CS with CC 546
Part 5: Testing Isolation UR 547
Summary 547
Review Questions 548

Chapter 10 Maintaining, Backing Up, and Recovering Data 553
DB2 Data Movement Utilities: The Big Picture 553
Data Movement File Formats 555
The DB2 EXPORT Utility 557
The DB2 IMPORT Utility 559
The DB2 Load Utility 562
The Ingest Utility 573
The db2move Utility 577
Generating Data Definition Language 579
DB2 Maintenance Utilities: The Big Picture 580
The RUNSTATS Utility 580
The REORG and REORGCHK Utilities 582
The REBIND Utility and the FLUSH PACKAGE CACHE Command 584
Automatic Database Maintenance 585
Database Backup, Recovery, and Roll Forward Concepts: The Big Picture 585
Recovery Scenarios and Strategies 586
Unit of Work (Transaction) 587
Types of Recovery 588
DB2 Transaction Logs 589
Logging Methods 596
Handling the DB2 Transaction Logs 601
Recovery Terminology 602
Performing Database and Table Space Backups 602
The Backup Files 607
Performing Database and Table Space Recovery 608
Database and Table Space Roll Forward 614
The Recovery History File 618
Database Recovery Using RECOVER DATABASE 620
Case Study 621
Summary 623
Review Questions 625

Appendix A Solutions to the Review Questions 629

附录B SQL 645的介绍
Querying DB2 Data 646
Derived Columns 646
The SELECT Statement with COUNT Aggregate Function 648
The SELECT Statement with DISTINCT Clause 648
DB2 Special Registers 649
Scalar and Column Functions 651
The CAST Expression 652
The FROM Clause 653
The WHERE Clause 653
Using FETCH FIRST n ROWS ONLY 653
The LIKE Predicate 654
The BETWEEN Predicate 655
The IN Predicate 655
The ORDER BY Clause 656
The GROUP BY...HAVING Clause 657
Joins 657
Working with NULLs 660
The CASE Expression 661
Adding a Row Number to the Result Set 662
Modifying Table Data 663
Selecting from UPDATE, DELETE, or INSERT 664
The MERGE Statement 666
The UNION, INTERSECT, and EXCEPT Operators 668
The UNION and UNION ALL Operators 668
The INTERSECT and INTERSECT ALL Operators 670
The EXCEPT and EXCEPT ALL Operators 670
Recursive SQL Statements 671

Appendix C A Comparison of DB2 and Oracle Terminology 675
Product and Functionality Mapping 675
Terminology Mapping 677
DB2 Compatibility Features 680
Data Types, SQL, and Packages Support in DB2 680
PL/SQL Support in DB2 681
Concurrency Control 681
IBM Database Conversion Workbench 681

Appendix D Diagnosing Problems 683
问题Diagnosis: The Big Picture 683
The Help (?) Command 684
DB2 First Occurrence Data Capture (FODC) 686
Administration Notification Log 686
db2diag.log 686
Trap Files 686
Dump Files 687
Core Files (Linux/UNIX Only) 687
DB2 Instance Level Configuration Parameters Related to FODC 687
Administration Notification Log Examples 690
db2diag.log Example 690
Tools for Troubleshooting 692
DB2VAL 692
DB2DIAG 692
The db2support Tool 692
The DB2 Trace Facility 693
The db2dart Tool 694
The INSPECT Tool 695
DB2COS 695
DB2PDCFG 697
DB2FODC 697
Searching for Known Problems 699

Appendix E Resources 701

Index 707

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simplyemailinformation@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through ourContact Us form.

不her Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on theAccount page. If a user no longer desires our service and desires to delete his or her account, please contact us atcustomer-service@informit.comand we will process the deletion of a user's account.

选择/退出


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive:www.e-skidka.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information toNevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read ourSupplemental privacy statement for California residentsin conjunction with this Privacy Notice. TheSupplemental privacy statement for California residentsexplains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • 为了保护the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Pleasecontact usabout this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020