Home>Store

SOA with .NET and Windows Azure: Realizing Service-Orientation with the Microsoft Platform, Portable Documents

Register your productto gain access to bonus material or receive a coupon.

SOA with .NET and Windows Azure: Realizing Service-Orientation with the Microsoft Platform, Portable Documents

eBook (Watermarked)

  • Your Price: $35.19
  • List Price: $43.99
  • About Watermarked eBooks
  • This PDF will be accessible from yourAccountpage after purchase and requires the freeAdobe® Reader®software to read it.

    The eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

    Watermarked eBook FAQ

Description

  • Copyright 2010
  • Dimensions: 7" x 9-1/8"
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-211965-X
  • ISBN-13: 978-0-13-211965-8

The Authoritative Guide to Building Service-Oriented Solutions with Microsoft .NET Technologies and the Windows Azure Cloud Computing Platform

InSOA with .NET and Windows Azure,前微软技术专家与Thomas Erl to explore service-oriented computing with Microsoft’s latest .NET service technologies and Windows Azure innovations.

The authors provide comprehensive documentation of on-premise and cloud-based modern service technology advancements within the Microsoft platform and further show how these technologies have increased the potential for applying and realizing service-orientation practices and goals.

Specifically, the book delves into Microsoft enterprise technologies, such as:

  • Windows Communication Foundation (WCF)
  • Windows Azure
  • Windows Workflow Foundation (WF)
  • Windows Azure AppFabric
  • BizTalk Server
  • Windows Presentation Foundation (WPF)

...as well as industry service mediums, including WS-* and REST, and many related service industry standards and technologies.

The book steps through common SOA design patterns and service-orientation principles, along with numerous code-level examples that further detail various technology architectures and implementations.

Topic Areas

This book covers the following primary topics:

  • Microsoft Service Technologies
  • Microsoft Enterprise Technologies
  • On-Premise & Cloud-Based Service Topics
  • Industry Service Technologies & Mediums
  • Service-Oriented Technology Architectural Models
  • Service-Orientation Design Paradigm
  • Service-Orientation Design Principles
  • SOA Design Patterns

About the Web Sites

This book series is further supported by a series of resources sites, including:

  • www.soabooks.com
  • www.soaspecs.com
  • www.soamag.com
  • www.serviceorientation.com
  • www.soapatterns.org
  • www.soaprinciples.com
  • www.whatissoa.com

Sample Content

Table of Contents

佛reword by S. Somasegar xxxi

佛reword by David Chappell xxxiii

Acknowledgments xxxv

CHAPTER 1: Introduction 1

1.1 About this Book 2

1.2 Objectives of this Book 3

1.3 Who this Book is For 4

1.4 What this Book Does Not Cover 4

1.5 Prerequisite Reading 4

1.6 How this Book is Organized 6

Part I: Fundamentals 7

Chapter 3: SOA Fundamentals 7

Chapter 4: A Brief History of Legacy .NET Distributed Technologies 7

Chapter 5: WCF Services 7

Chapter 6: WCF Extensions 7

Chapter 7: .NET Enterprise Services Technologies 7

Chapter 8: Cloud Services with Windows Azure 8

Part II: Services and Service Composition 8

第九章:面向服务和。net我部分:Service Contracts and Interoperability 8

Chapter 10: Service-Orientation with .NET Part II: Coupling, Abstraction, and Discoverability 8

Chapter 11: Service-Orientation with .NET Part III: Reusability and Agnostic Service Models 8

Chapter 12: Service-Orientation with .NET Part IV: Service Composition and Orchestration Basics 9

Chapter 13: Orchestration Patterns with WF 9

Chapter 14: Orchestration Patterns with BizTalk Server 9

Part III: Infrastructure and Architecture 9

Chapter 15: Enterprise Service Bus with BizTalk Server and Windows Azure 9

Chapter 16: Windows Azure Platform AppFabric Service Bus 10

Chapter 17: SOA Security with .NET and Windows Azure 10

Chapter 18: Service-Oriented Presentation Layers with .NET 10

Chapter 19: Service Performance Optimization 10

Chapter 20: SOA Metrics with BAM 10

Part IV: Appendices 10

Appendix A: Case Study Conclusion 10

Appendix B: Industry Standards Reference 11

Appendix C: Service-Orientation Principles Reference 11

Appendix D: SOA Design Patterns Reference 11

Appendix E: The Annotated SOA Manifesto 11

Appendix F: Additional Resources 11

1.7 How Principles and Patterns are Used in this Book 11

Sources 11

Reference Notation 12

1.8 Symbols, Figures, and Style Conventions 13

Symbol Legend 13

如何使用颜色13吗

Additional Information 13

Updates, Errata, and Resources (www.soabooks.com) 13

Master Glossary (www.soaglossary.com) 13

Referenced Specifications (www.soaspecs.com) 13

SOASchool.com™ SOA Certified Professional (SOACP) 14

The SOA Magazine (www.soamag.com) 14

Notification Service 14

CHAPTER 2: Case Study Background 15

2.1 How Case Studies Are Used 16

2.2 Case Study Background #1: Standard Mold 16

History 16

Technical Infrastructure 16

Business Goals and Obstacles 17

2.3 Case Study Background #2: Superior Stamping 18

History 18

Technical Infrastructure 18

Business Goals and Obstacles 19

PART I: FUNDAMENTALS

CHAPTER 3: SOA Fundamentals 23

3.1 Basic SOA Terminology 24

Service-Oriented Computing 25

Service-Orientation 25

Service-Oriented Architecture (SOA) 27

Services 28

Services as Components 29

Services as Web Services 30

Services as REST Services 31

Service Models 31

Agnostic Logic and Non-Agnostic Logic 32

Service Composition 33

Service Inventory 34

Service-Oriented Analysis 34

Service Candidate 35

Service-Oriented Design 35

Service Contract 36

Service-Related Granularity 37

SOA Design Patterns 38

3.2 Service-Oriented Computing Goals 40

Increased Intrinsic Interoperability 40

Increased Federation 40

Increased Vendor Diversification Options 40

Increased Business and Technology Domain Alignment 41

3.3 Further Reading 41

CHAPTER 4: A Brief History of Legacy .NET Distributed Technologies 43

4.1 Distributed Computing 101 44

Client-Server 44

Distributed Architecture 45

Service-Oriented Architecture 47

4.2 .NET Enterprise Services 48

It All Began with COM (and DCOM) 48

COM+ Services 49

.NET Assemblies 51

Distributed Transaction Coordinator 51

.NET Enterprise Services and Service-Orientation 53

4.3 .NET Remoting 54

.NET Remoting Architecture 54

Serializable Classes 56

Remotable Classes 56

Ordinary Classes 56

Hosting .NET Remoting Components 56

Windows Service 56

IIS Hosting Under ASP.NET 57

Hosting a .NET Remoting Component in a Console Application 57

.NET COM+ Services 57

.NET Remoting Configurations 57

Activation Types 58

Message Formats 60

Communication Protocols 60

Object Lifetime Management 61

.NET Remoting and Service-Orientation 61

4.4 Microsoft Messaging Queue (MSMQ) 63

The Queues 64

Sending and Receiving Messages 65

MSMQ和面向服务66

4.5 System.Transactions 67

Distributed Resource Transactions 67

Explicit and Implicit Programming Models 68

Ambient Transactions 69

4.6 Web Services (ASMX and WSE) 70

XML Web Services (ASMX) 71

The WebService Attribute 71

The WebMethod Attribute 72

Web Service Enhancements (WSE) 73

4.7 REST Service Processing with IHttpHandler 74

CHAPTER 5: WCF Services 75

5.1在view 76

5.2 Service Contracts with WCF 78

WCF Terminology 78

WCF Service Contract 78

接口契约78

Operation Contract 78

Data Contract 78

Message Contract 79

Service Endpoint 79

The ServiceContract and OperationContract Attributes 79

Data Models and the DataContract Attribute 82

Messaging and the MessageContract Attribute 83

Service Endpoints and the endpoint Element 86

Address 88

Bindings 89

Contract 92

REST Service Classes and Attributes 92

The WebGet Attribute 93

The WebInvoke Attribute 95

WCF UriTemplate Attribute 96

Faults and the FaultContract Attribute 98

MEX Endpoints 100

Versioning Considerations 102

5.3 Service Implementation with WCF 104

Behaviors 104

Instancing 105

A Sample Implementation 106

5.4 Service Hosting with WCF 108

Self-Hosted Services 110

Managed Windows Services 112

IIS Process Boundary 113

Windows Activation Services (WAS) 114

Hosting REST Services 115

5.5 Service Consumers with WCF 116

Using the Service Metadata Tool 117

Writing the Proxy Class for a Service 118

Using the ChannelFactory Class 119

CHAPTER 6: WCF Extensions 121

6.1 WCF Security 122

Security Modes 123

Authorization 125

Federated Identity 126

6.2 WCF Transactions 127

Operation Attributes for Transactions 127

TransactionScopeRequired 128

TransactionAutoComplete 128

TransactionFlow 128

Service Attributes for Transactions 129

TransactionIsolationLevel 129

TransactionAutoCompleteOnSessionClose 130

TransactionTimeout 130

Durable Services 131

6.3 WCF Router 132

The RoutingService Class 133

Routing Contracts 134

Routing Configuration 135

Step 1: Define Endpoints 135

Step 2: Configure Service Behavior 136

Step 3: Enumerate Target Endpoints 136

Step 4: Define Message Filters 137

Step 5: Create a Filter Table 138

Fault Tolerance 139

6.4 WCF Discovery 140

Discovery Modes 141

Locating a Service Ad Hoc 143

Sending and Receiving Service Announcements 144

Discovery Proxies for Managed Discovery 146

Discovering from a Discovery Proxy 146

Implicit Service Discovery 147

6.5 WCF Extensibility 148

WCF Layers 149

Layered Extensibility 149

Channel Layer Extensibility 150

6.6 WCF Management Tools 151

Administration 151

Troubleshooting 151

Logging Messages 153

CHAPTER 7: .NET Enterprise Services Technologies 155

7.1 SQL Server 156

Native XML Web Services Support 157

Service Broker (SSB) 160

Query Notification 165

XML Support in SQL Server 165

7.2 Windows Workflow Foundation (WF) 166

WF Architecture 167

Workflows 168

Sequential Workflows 169

State Machine Workflows 169

Workflow Designer 169

Workflow Persistence (with WF) 170

Communicating with the Host Container 171

Activities 172

Workflow Runtime Environment 175

WF Programming Model 176

Passing Parameters into a Workflow Instance 178

Returning Parameters from a Workflow Instance 178

Workflow-Enabled Services 179

Versioning Orchestrations 180

WF Extensibility 180

Business Rules 180

7.3 Application Blocks and Software Factories 181

Application Blocks 182

Software Factories 184

Guidance Toolkits 184

Web Services Software Factory 184

7.4 Windows Server AppFabric 187

Configurable Hosting Environment 188

Workflow Persistence (with AppFabric) 189

In-Memory Application Cache Platform 190

Manageability Extensions 192

Application Server Event Collector 192

7.5 BizTalk Server 193

BizTalk Server Architecture 194

Messaging 196

Pipelines 197

Pipeline Components 198

Ports and Locations 199

Adapters 199

Context Properties 200

Itineraries 201

Unified Exception Management 202

CHAPTER 8: Cloud Services with Windows Azure 205

8.1 Cloud Computing 101 206

Cloud Deployment Models 208

Public Cloud 208

Private Cloud 208

Community Cloud 209

Other Deployment Models 209

Intercloud(云of Clouds) 209

Deployment Models and Windows Azure 210

210年服务交付模型

Infrastructure-as-a-Service (IaaS) 210

Platform-as-a-Service (PaaS) 211

Software-as-a-Service (SaaS) 211

Other Delivery Models 211

IaaS vs. PaaS 211

8.2 Windows Azure Platform Overview 213

Windows Azure (Application Container) 216

SQL Azure 217

Windows Azure Platform AppFabric 218

8.3 Windows Azure Roles 219

Web Roles and Worker Roles 220

Virtual Machines 220

Input Endpoints 221

Inter-Role Communication 222

8.4 Hello World in Windows Azure 223

1. Create a Cloud Service Project 224

2. Choose an ASP.NET Web Role 224

3.Create the Solution 225

4. Instantiate the Service 226

8.5 A Web Service in Windows Azure 227

1. Create a Host Service and Storage Service 233

2. Create and Deploy a Service Package 233

3.Promote the Service to Production 234

8.6 A REST Service in Windows Azure 235

REST Service Addressing 235

Creating a Windows Azure REST Service 236

8.7 Windows Azure Storage 239

Tables 240

Entities and Properties 240

Data Access 241

Queues 241

Blobs 242

Block BlobsPage Blobs 243

Windows Azure Drive 243

PART II: SERVICES AND SERVICE COMPOSITION

CHAPTER 9: Service-Orientation with .NET Part I: Service Contracts and Interoperability 247

9.1 Standardized Service Contract 250

Contract-First 250

1. Create or Reuse Data Contract 251

2. Create Message Contract 251

3.Create Interface Contract 252

Standardized Service Contract and Patterns 252

9.2 Canonical Schema 253

Creating Schemas with Visual Studio 254

创erating .NET Types 258

Using the DataContract Library 264

9.3 Data Model Transformation 267

Object-to-Object 269

LINQ-to-XML 271

XSLT Transformation 272

9.4 Canonical Protocol 274

Web Service 275

REST Service 277

Component 278

Another WCF Option: Named Pipes 279

Dual Protocols with WCF 279

9.5 Canonical Expression 280

Service Naming Conventions 280

Service Capability Naming Conventions 281

CHAPTER 10: Service-Orientation with .NET Part II: Coupling, Abstraction, and Discoverability 283

10.1 Service Loose Coupling 285

Service Loose Coupling and Patterns 286

10.2 Decoupled Contract 288

WSDL-First 289

创erating Service Code Using Svcutil 294

创erating WCF Service Code Using WSCF.blue 297

创erating ASMX Service Code Using WSCF.classic 302

10.3 Service Façade 304

10.4 Concurrent Contracts 307

10.5 Service Loose Coupling and Service Capability Granularity 308

10.6 Service Abstraction 313

10.7 Validation Abstraction 315

10.8 Exception Shielding 319

10.9 Service Discoverability 321

In-line Documentation 322

REST and Hypermedia 323

Service Profiles 323

10.10 Metadata Centralization 325

CHAPTER 11: Service-Orientation with .NET Part III: Reusability and Agnostic Service Models 327

11.1 Service Reusability and the Separation of Concerns 329

Functional Decomposition 330

Service Encapsulation 332

Agnostic Context 332

Agnostic Capability 334

Utility Abstraction 335

Entity Abstraction 336

The Inventory Analysis Cycle 337

Additional Design Considerations 339

11.2 Case Study Example: Utility Abstraction with a .NET Web Service 339

11.3 Case Study Example: Entity Abstraction with a .NET REST Service 351

CHAPTER 12: Service-Orientation with .NET Part IV: Service Composition and Orchestration Basics 369

12.1 Service Composition 101 371

Service-Orientation and Service Composition 371

Service Composability (PSD) 373

Capability Composition and Capability Recomposition 374

功能成分375

Capability Recomposition 375

Composition Roles 377

Service Layers 377

Non-Agnostic Context 379

Process Abstraction and Task Services 380

12.2 Orchestration 382

Process Abstraction, Process Centralization, and Orchestrated Task Services 382

Process Centralization and Tools 384

Process Abstraction and WS-BPEL 385

State Repository and Compensating Service Transaction 385

State Repository with .NET 386

Compensating Service Transaction 387

Other Patterns 388

Microsoft Orchestration Platforms: WF and BizTalk Server 388

CHAPTER 13: Orchestration Patterns with WF 393

13.1 Process Abstraction and Orchestrated Task Services 397

A Brief History of WF Service Contract Support 397

Publishing WF Workflows as Web Services and Activities 399

Workflows Published as ASMX Services 399

Workflows Published via WCF 3.5 Activities 408

Workflows Published via WCF 4.0 Activities 410

Workflows Published via ExternalDataExchange Services 413

WS-I BasicProfile Support 417

Publishing WF Workflows as REST Services 419

JSON Encoding 421

Send and Receive Activity Configuration 422

Orchestrated Task Services with REST and WF 4.0 423

13.2 Process Centralization 425

Centralized Process Maintenance 425

WS-BPEL Support 426

13.3 State Repository 426

SQL Persistence Service and Scaling Out in WF 3.0 429

SQL Persistence Service and Scaling Out in WF 4 431

13.4 Compensating Service Transaction 434

Creating Compensations 434

Triggering Compensations 435

13.5 Case Study Example 436

CHAPTER 14: Orchestration Patterns with BizTalk Server 441

14.1 Process Abstraction and Orchestrated Task Services 443

Orchestrated Task Service Contracts 445

WS-* Support 447

Case Study Example 448

14.2 Process Centralization 450

Centralized Process Maintenance 450

WS-BPEL Support 451

Exporting BizTalk Orchestrations to WS-BPEL 451

Importing WS-BPEL Processes into BizTalk 454

14.3 State Repository 455

14.4 Compensating Service Transaction 456

Case Study Example 459

PART III: INFRASTRUCTURE AND ARCHITECTURE

CHAPTER 15: Enterprise Service Bus with BizTalk Server and Windows Azure 465

15.1 Microsoft and the ESB 466

15.2 Integration with BizTalk 467

Application Integration 101 467

The BizTalk Hub-Bus Model 469

15.3 The ESB Toolkit 470

Itineraries 472

Itineraries Types 474

The Itinerary Lifecycle 475

Resolvers 476

Adapter Providers 478

WCF-Custom and REST Services 479

15.4 Distributed and Scalable ESB Architecture 480

Configuring for High-Availability 480

Techniques for Scaling 481

Distributed ESBs 482

15.5 Cloud-Enabling the ESB with Windows Azure 483

Receiving Messages from Azure’s AppFabric Service Bus 484

Sending Messages to Azure’s AppFabric Service Bus 485

15.6 Governance Considerations 487

SLA Enforcement 488

Monitoring 488

Preparing Project Teams 489

15.7 Mapping the Microsoft Platform to the Enterprise Service Bus Pattern 490

CHAPTER 16: Windows Azure Platform AppFabric Service Bus 493

16.1 Introducing the Service Bus 494

Connectivity Fabric 494

Message Buffers 496

Service Registry 497

16.2 Service Bus and REST 498

REST-Based Service Design 498

REST-Based Service Consumer Design 499

Message Buffers and REST 499

16.3 Service Bus Connectivity Models 499

Eventing 500

Service Remoting 501

Tunneling 501

16.4 Working with Windows Azure Platform AppFabric Service Bus 503

Setting up the AppFabric Service Bus 504

定义一个基于rest的服务总线合同513

Creating the Service Bus Message Buffer 514

CHAPTER 17: SOA Security with .NET and Windows Azure 517

17.1 Authentication and Authorization with WCF 518

Direct and Brokered Authentication 518

Direct Authentication 518

Brokered Authentication 519

Authentication Patterns in WCF 520

Role-Based Authorization 520

Authorization Roles in WCF 521

Authorizing Operations with Roles 523

Claims-Based Authorization 524

Claims Processing in WCF 526

Implementing Claims-Based Authorization 527

Access Control in Windows Azure 528

Designing Custom Claims 529

Case Study Example 530

17.2 Windows Identity Foundation (WIF) 533

Digital Identity 534

The Identity Metasystem 534

Windows Cardspace 536

Active Directory联合服务(ADFS) 539

WIF Programming Model 540

WCF Integration 540

Programming Windows Cardspace 540

Developing a Relying Party 541

Developing an Identity Provider 542

17.3 Windows Azure Security 543

Cloud Computing Security 101 543

Cross-Domain Access Control 544

Hybrid Cloud Security 545

Inter-Organization Service Composition Security 545

External Identity Providers 546

Claims-Based Access Control, As-A-Service 546

Windows Azure Platform AppFabric Access Control Overview 548

Access Control Step-by-Step 550

Access Control and REST 552

Access Control Service Authorization Scenarios 553

Hybrid Cloud Authorization Model 553

Public Cloud Authorization Model 554

Cloud-to-Cloud Authorization Model 554

Case Study Example 555

CHAPTER 18: Service-Oriented Presentation Layers with .NET 557

18.1 Windows Presentation Foundation and the Prism Library 559

Shell 561

Views 562

View Discovery versus View Injection 563

Regions 563

Modules 565

Shared Services 566

18.2 Design Patterns for Presentation Logic 567

User Interface Patterns 567

Composite View [CJP] 568

Command [DP] 568

UI Mediator 568

Separated Presentation 568

Modularity Patterns 569

Separated Interface [PEA] 570

Plug-In [PEA] 570

Event Aggregator [PEA] 570

Inversion of Control [DP] 570

Dependency Injection [PEA] 570

Service Locator [CJP] 571

18.3 A Simple Service-Oriented User Interface 571

Creating the Project 571

Dynamically Loading Modules 579

CHAPTER 19: Service Performance Optimization 583

19.1 Overview 584

Optimization Areas 585

Service Implementation Processing 585

Service Framework Processing 586

Wire Transmission Processing 586

19.2 Service Performance Optimization Techniques 586

Caching to Avoid Costly Processing 587

Intermediary 589

Service Container 589

Service Proxy 590

Caching Utility Service 590

Comparing Caching Techniques 591

Cache Implementation Technologies 592

Computing Cache Keys 593

Case Study Example 594

Method 1 597

Method 2 598

Caching REST Responses 599

Monitoring Cache Efficiency 601

Reducing Resource Contention 603

Request Throttling 604

Throttling With WCF 605

Case Study Example 606

Request Throttling with BizTalk Server 607

Coarse-Grained Service Contracts 608

Case Study Example 609

Selecting Application Containers 610

Performance Policies 612

Case Study Example 620

REST Service Message Sizes 621

Hardware Encryption 622

Transport Encryption 622

Message Encryption 623

Custom Encryption Solution 623

High Performance Transport 625

Case Study Example 626

MTOM Encoding 627

Case Study Example 628

Performance Considerations for Service Contract Design 630

Case Study Example 631

Impact on Service-Orientation Principles 633

19.3 Service Composition Performance Optimization Techniques 637

Transformation Avoidance and Caching 637

Asynchronous Interactions 639

Parallelize Where Possible 641

Parallel Activity in WF 641

Parallel Execution in BizTalk Server 643

Replicator Activity in WF 644

Consider Co-Hosting When Necessary 645

Compose High Performance Services 648

Impact on Service-Orientation Principles 648

CHAPTER 20: SOA Metrics with BAM 653

20.1 SOA Metric Types 654

20.2 Introducing BizTalk BAM 655

BizTalk and BAM 655

BAM Solution Architecture 656

The BAM Management Utility 659

The Tracking Profile Editor (TPE) 659

Real-Time vs Scheduled Aggregations 660

20.3 Activities and Views 661

Roles-based Views for Service Governance 662

Creating Views 663

20.4 BAM APIs 665

Event Streams 665

DirectEventStream (DES) 665

BufferedEventStream (BES) 665

OrchestrationEventStream (OES) 666

IPipelineContext Interface 666

Abstracted APIs for Service Metrics 666

Metrics for Service Compositions 669

WCF and WF Interceptors 670

Notifications 670

Rapid Prototyping 671

20.5 Managing BAM 672

Database Outages 672

Security 672

Scripting Deployment 673

Reporting 676

Case Study Example 677

PART IV: APPENDICES

APPENDIX A: Case Study Conclusion 685

APPENDIX B: Industry Standards Reference 687

APPENDIX C: Service-OrientationPrinciples Reference 691

APPENDIX D: SOA Design Patterns Reference 707

APPENDIX E: The Annotated SOA Manifesto 795

The Annotated SOA Manifesto 796

APPENDIX F: Additional Resources 809

Consuming Services with WCF 811

Introduction 811

Cleaning Up Resources 812

The Proper Disposal and Closing of an ICommunicationObject 812

The ICommunicationObject.Close() Method 812

The ICommunicationObject.Abort() Method 814

Abort() versus Close() 814

IDisposable for Cleaning Up Resources 814

IDisposable and Its Relation to ClientBase and ChannelFactory 815

Cleaning Up Resources with the Using Block 816

Cleaning Up Resources with the Try-Catch-Finally-Abort Pattern 817

Handling Exceptions and Cleaning Up Resources with the Try-Close-Catch-Abort Pattern 818

Cleaning Up Resources in a Convenient Way 819

How to Handle Connections when Consuming Services Using WCF 822

Conclusion 823

About the Authors 825

About the Contributors 829

About the Foreword Contributors 831

Index 833

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

佛r inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

佛r orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simplyemailinformation@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through ourContact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on theAccount page. If a user no longer desires our service and desires to delete his or her account, please contact us atcustomer-service@informit.comand we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive:www.e-skidka.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information toNevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read ourSupplemental privacy statement for California residentsin conjunction with this Privacy Notice. TheSupplemental privacy statement for California residentsexplains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Pleasecontact usabout this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020