Home > Store

Cryptography and Network Security: Principles and Practice, 6th Edition

Register your product to gain access to bonus material or receive a coupon.

Cryptography and Network Security: Principles and Practice, 6th Edition

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

APPLY THEORY AND/OR RESEARCH

  • Use of Sage to illustrate cryptographic algorithms.  The Sage computer algebra system is used to provide numerous examples of cryptographic algorithms and is also used as the basis for numerous hands-on assignments. This is an unmatched means for students to learn this subject.
  • Comprehensive up-to-date survey of cryptographic algorithms. The student gains an understanding of all of important cryptographic algorithms and is able to assess their relative strengths and weaknesses.
  • Complete coverage of authentication and digital signatures. Enables the student to compare and evaluate competing approaches, and thus understand each better.
  • Unified, comprehensive treatment of mutual trust topics. Key management and user authentication are fundamental to the successful use of cryptographic services. This treatment gives the student a systematic and comprehensive understanding of the issues involved.
  • Excellent collection of homework problems. Approximately 300 problems reinforce material in the text and also introduce new concepts and techniques. Problems are included at the end of each chapter.
  • Solid yet easy-to-follow mathematical background.  It is impossible to assess the relative strengths of various approaches without some understanding of number theory and probability. The book requires no prior math background and gives the student a clear understanding of the math required. Coverage of number theory and finite fields, including numerous worked-out examples, make this abstract subject clear.
  • Comprehensive, up-to-date coverage of IP Security.  IPSec is one of the most complex and one of the most important of the new network security standards. This book gives a clear and detailed technical treatment.
  • Comprehensive, up-to-date coverage of wireless network Security. The student gains an understanding of the importance of this topic.
  • Coverage of both PGP and S/MIME for electronic mail security.  These are the two most important approaches to email security. The book gives the student an understanding of both schemes at a detailed technical level. 
  • Comprehensive and unified discussion of intruders and viruses. The threats of intruders (hackers) and viruses are distinct, but there are also similarities. By treating the two in the same chapter and in a unified way, the student gains greater understanding of both topics.

SUPPORT INSTRUCTORS AND STUDENTS

Unequalled support for instructors and students

  • The book includes 300 homework problems with a range of difficulty plus numerous review questions; the Instructor's Solutions Manual contains solutions to all problems and questions.
  • A Computerized Test Generator
  • The book makes liberal use of figures and tables to clarify concepts.
  • List of key words, recommended reading list, and recommended Web sites at the end of each chapter.
  • Glossary
  • List of acronyms on back endpaper
  • Up-to-date bibliography

Instructor Resources. The following protected instructor material is available on the Publisher’s Web site at www.pearsonhighered.com/stallings. For username and password information, please contact your Pearson Representative.

  • TestBank: A chapter-by-chapter set of question that can be used by the instructor for quizzes or made available to the student for self-study.
  • PowerPoint Lecture Slides: A set of slides covering all chapters, suitable for use in lecturing.
  • Instructor Solutions Manual: Solutions to end-of-chapter Review Questions and Problems.
  • Instructor Projects Manual: Suggested project assignments
  • Figures and Tables
  • Sample Java Programs
  • Sample Lab Exercises
  • Additional Sample Lecture Slides
  • Textbook Errata
  • Link to online premium content
    • Online Chapters
    • Online Appendices
    • Key Papers
    • Supporting Documents
    • Sage Code Examples
    • VideoNotes Tutorials

Author-maintained Instructor Companion Web site http://williamstallings.com/Cryptography/ content includes:

  • Useful links
  • Links to Web sites for courses taught using this book
  • Sign-up information for a mailing list for instructors that allows instructors using the book to exchange information, suggestions, and questions with each other and the author.

Student Resources. Access to the Companion Website and access to the online premium content is located at www.pearsonhighered.com/stallings. Students must use the access card located in the front of the book to register and access the online material. If there is no access card in the front of the textbook, students can purchase access by going to www.pearsonhighered.com/stallings and selecting “purchase access to premium content.” Instructors must register on the site to access the material.

o      Security and Cryptography Forums

o      Cryptography Demos

o      Textbook Errata

o      Chapter-by-Chapter Links

ENGAGE STUDENTS WITH HANDS-ON PROJECTS

Unequalled support for projects. For many instructors, an important component of a course is a project or set of projects by which the student gets hands-on experience to reinforce concepts from the text. The book provides unparalleled support for including a projects component with the course. The Instructor's Manual includes guidance on how to assign and structure the projects and includes a set of suggested projects that covers a broad range of topics from the text. The following types of projects are supported in the Instructor's Manual:

  • Hacking Assignments: A series of hacking problems for the student to experiment with.
  • Block Cipher Projects: These give the student greater understanding of AES, DES, and modes of operation.
  • Programming Projects: The Instructor's Manual includes a series of small programming projects that cover a broad range of topics, and that can be implemented in any suitable language on any platform.
  • Research Projects: A series of research assignments that instruct the student to research a particular topic on the Internet and write a report.
  • Practical Security Assessments: A set of exercises to examine current infrastructure and practices of an existing organization.
  • Reading/Report Assignments: A list of papers in the literature that can be assigned for the student to read and then write a short report.
  • Writing Assignments: Designed to engage the student in a deep understanding of the topic and to reinforce their knowledge of hard facts and problem solving techniques.

Description

  • Copyright 2014
  • Edition: 6th
  • Book
  • ISBN-10: 0-13-335469-5
  • ISBN-13: 978-0-13-335469-0

For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-study and so provides a solid and up-to-date tutorial. The book is also a comprehensive treatment of cryptography and network security and so is suitable as a reference for a system engineer, programmer, system manager, network manager, product marketing personnel, or system support specialist.

A practical survey of cryptography and network security with unmatched support for instructors and students

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.

Sample Content

Table of Contents

Preface xiii

Chapter 0 Guide for Readers and Instructors 1

0.1 Outline of This Book 2

0.2 A Roadmap for Readers and Instructors 3

0.3 Internet and Web Resources 4

0.4 Standards 5

Chapter 1 Overview 7

1.1 Computer Security Concepts 9

1.2 The OSI Security Architecture 14

1.3 Security Attacks 15

1.4 Security Services 17

1.5 Security Mechanisms 20

1.6 A Model for Network Security 22

1.7 Recommended Reading 24

1.8 Key Terms, Review Questions, and Problems 25

Part One Symmetric Ciphers 27

Chapter 2 Classical Encryption Techniques 27

2.1 Symmetric Cipher Model 28

2.2 Substitution Techniques 34

2.3 Transposition Techniques 49

2.4 Rotor Machines 50

2.5 Steganography 52

2.6 Recommended Reading 54

2.7 Key Terms, Review Questions, and Problems 55

Chapter 3 Block Ciphers and the Data Encryption Standard 61

3.1 Traditional Block Cipher Structure 63

3.2 The Data Encryption Standard 72

3.3 A DES Example 74

3.4 The Strength of DES 77

3.5 Block Cipher Design Principles 78

3.6 Recommended Reading 80

3.7 Key Terms, Review Questions, and Problems 81

Chapter 4 Basic Concepts in Number Theory and Finite Fields 85

4.1 Divisibility and the Division Algorithm 87

4.2 The Euclidean Algorithm 88

4.3 Modular Arithmetic 91

4.4 Groups, Rings, and Fields 99

4.5 Finite Fields of the Form GF( p) 102

4.6 Polynomial Arithmetic 106

4.7 Finite Fields of the Form GF(2n) 112

4.8 Recommended Reading 124

4.9 Key Terms, Review Questions, and Problems 124

Appendix 4A The Meaning of mod 127

Chapter 5 Advanced Encryption Standard 129

5.1 Finite Field Arithmetic 130

5.2 AES Structure 132

5.3 AES Transformation Functions 137

5.4 AES Key Expansion 148

5.5 An AES Example 151

5.6 AES Implementation 155

5.7 Recommended Reading 159

5.8 Key Terms, Review Questions, and Problems 160

Appendix 5A Polynomials with Coefficients in GF(28) 162

Appendix 5B Simplified AES 164

Chapter 6 Block Cipher Operation 174

6.1 Multiple Encryption and Triple DES 175

6.2 Electronic Code book 180

6.3 Cipher Block Chaining Mode 183

6.4 Cipher Feedback Mode 185

6.5 Output Feedback Mode 187

6.6 Counter Mode 189

6.7 XTS-AES Mode for Block-Oriented Storage Devices 191

6.8 Recommended Reading 198

6.9 Key Terms, Review Questions, and Problems 198

Chapter 7 Pseudorandom Number Generation and Stream Ciphers 202

7.1 Principles of Pseudorandom Number Generation 203

7.2 Pseudorandom Number Generators 210

7.3 Pseudorandom Number Generation Using a Block Cipher 213

7.4 Stream Ciphers 219

7.5 RC4 221

7.6 True Random Number Generators 223

7.7 Recommended Reading 227

7.8 Key Terms, Review Questions, and Problems 228

Part Two Asymmetric Ciphers 231

Chapter 8 More Number Theory 231

8.1 Prime Numbers 232

8.2 Fermat’s and Euler’s Theorems 236

8.3 Testing for Primality 239

8.4 The Chinese Remainder Theorem 242

8.5 Discrete Logarithms 244

8.6 Recommended Reading 249

8.7 Key Terms, Review Questions, and Problems 250

Chapter 9 Public-Key Cryptography and RSA 253

9.1 Principles of Public-Key Cryptosystems 256

9.2 The RSA Algorithm 264

9.3 Recommended Reading 278

9.4 Key Terms, Review Questions, and Problems 279

Appendix 9A The Complexity of Algorithms 283

Chapter 10 Other Public-Key Cryptosystems 286

10.1 Diffie-Hellman Key Exchange 287

10.2 Elgamal Cryptographic System 292

10.3 Elliptic Curve Arithmetic 295

10.4 Elliptic Curve Cryptography 303

10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher 306

10.6 Recommended Reading 309

10.7 Key Terms, Review Questions, and Problems 309

Part Three Cryptographic Data Integrity Algorithms 313

Chapter 11 Cryptographic Hash Functions 313

11.1 Applications of Cryptographic Hash Functions 315

11.2 Two Simple Hash Functions 320

11.3 Requirements and Security 322

11.4 Hash Functions Based on Cipher Block Chaining 328

11.5 Secure Hash Algorithm (SHA) 329

11.6 SHA-3 339

11.7 Recommended Reading 351

11.8 Key Terms, Review Questions, and Problems 351

Chapter 12 Message Authentication Codes 355

12.1 Message Authentication Requirements 357

12.2 Message Authentication Functions 357

12.3 Requirements for Message Authentication Codes 365

12.4 Security of MACs 367

12.5 MACs Based on Hash Functions: HMAC 368

12.6 MACs Based on Block Ciphers: DAA and CMAC 373

12.7 Authenticated Encryption: CCM and GCM 376

12.8 Key Wrapping 382

12.9 Pseudorandom Number Generation using Hash Functions and MACs 387

12.10 Recommended Reading 390

12.11 Key Terms, Review Questions, and Problems 390

Chapter 13 Digital Signatures 393

13.1 Digital Signatures 395

13.2 Elgamal Digital Signature Scheme 398

13.3 Schnorr Digital Signature Scheme 400

13.4 NIST Digital Signature Algorithm 401

13.5 Elliptic Curve Digital Signature Algorithm 404

13.6 RSA-PSS Digital Signature Algorithm 407

13.7 Recommended Reading 412

13.8 Key Terms, Review Questions, and Problems 412

Part Four Mutual Trust 417

Chapter 14 Key Management and Distribution 417

14.1 Symmetric Key Distribution Using Symmetric Encryption 418

14.2 Symmetric Key Distribution Using Asymmetric Encryption 427

14.3 Distribution of Public Keys 430

14.4 X.509 Certificates 435

14.5 Public-Key Infrastructure 443

14.6 Recommended Reading 445

14.7 Key Terms, Review Questions, and Problems 446

Chapter 15 User Authentication 450

15.1 Remote User-Authentication Principles 451

15.2 Remote User-Authentication Using Symmetric Encryption 454

15.3 Kerberos 458

15.4 Remote User Authentication Using Asymmetric Encryption 476

15.5 Federated Identity Management 478

15.6 Personal Identity Verification 484

15.7 Recommended Reading 491

15.8 Key Terms, Review Questions, and Problems 491

Part Five Network And Internet Security 495

Chapter 16 Network Access Control and Cloud Security 495

16.1 Network Access Control 496

16.2 Extensible Authentication Protocol 499

16.3 IEEE 802.1X Port-Based Network Access Control 503

16.4 Cloud Computing 505

16.5 Cloud Security Risks and Countermeasures 512

16.6 Data Protection in the Cloud 514

16.7 Cloud Security as a Service 517

16.8 Recommended Reading 520

16.9 Key Terms, Review Questions, and Problems 521

Chapter 17 Transport-Level Security 522

17.1 Web Security Considerations 523

17.2 Secure Sockets Layer 525

17.3 Transport Layer Security 539

17.4 HTTPS 543

17.5 Secure Shell (SSH) 544

17.6 Recommended Reading 555

17.7 Key Terms, Review Questions, and Problems 556

Chapter 18 Wireless Network Security 558

18.1 Wireless Security 559

18.2 Mobile Device Security 562

18.3 IEEE 802.11 Wireless LAN Overview 566

18.4 IEEE 802.11i Wireless LAN Security 572

18.5 Recommended Reading 586

18.6 Key Terms, Review Questions, and Problems 587

Chapter 19 Electronic Mail Security 590

19.1 Pretty Good Privacy 591

19.2 S/MIME 599

19.3 DomainKeys Identified Mail 615

19.4 Recommended Reading 622

19.5 Key Terms, Review Questions, and Problems 622

Appendix 19A Radix-64 Conversion 623

Chapter 20 IP Security 626

20.1 IP Security Overview 628

20.2 IP Security Policy 632

20.3 Encapsulating Security Payload 638

20.4 Combining Security Associations 645

20.5 Internet Key Exchange 649

20.6 Cryptographic Suites 657

20.7 Recommended Reading 659

20.8 Key Terms, Review Questions, and Problems 659

Appendices 661

Appendix A Projects for Teaching Cryptography and Network Security 661

A.1 Sage Computer Algebra Projects 662

A.2 Hacking Project 663

A.3 Block Cipher Projects 664

A.4 Laboratory Exercises 664

A.5 Research Projects 664

A.6 Programming Projects 665

A.7 Practical Security Assessments 665

A.8 Firewall Projects 666

A.9 Case Studies 666

A.10 Writing Assignments 666

A.11 Reading/Report Assignments 667

A.12 Discussion Topics 667

Appendix B Sage Examples 668

B.1 Linear Algebra and Matrix Functionality 669

B.2 Chapter 2: Classical Encryption 670

B.3 Chapter 3: Block Ciphers and the Data Encryption Standard 673

B.4 Chapter 4: Basic Concepts in Number Theory and Finite Fields 677

B.5 Chapter 5: Advanced Encryption Standard 684

viii Contents

B.6 Chapter 6: Pseudorandom Number Generation and Stream Ciphers 689

B.7 Chapter 8: Number Theory 691

B.8 Chapter 9: Public-Key Cryptography and RSA 696

B.9 Chapter 10: Other Public-Key Cryptosystems 699

B.10 Chapter 11: Cryptographic Hash Functions 704

B.11 Chapter 13: Digital Signatures 706

References 710

Credits 720

Index 723

Online Chapters and Appendices1

Part Six System Security

Chapter 21 Malicious Software

21.1 Types of Malicious Software

21.2 Propagation — Infected Content - Viruses

21.3 Propagation — Vulnerability Exploit - Worms

21.4 Propagation — Social Engineering — SPAM, Trojans

21.5 Payload — System Corruption

21.6 Payload — Attack Agent — Zombie, Bots

21.7 Payload — Information Theft — Keyloggers, Phishing, Spyware

21.8 Payload — Stealthing — Backdoors, Rootkits

21.9 Countermeasures

21.10 Distributed Denial of Service Attacks

21.11 Recommended Reading

21.12 Key Terms, Review Questions, and Problems

Chapter 22 Intruders

22.1 Intruders

22.2 Intrusion Detection

22.3 Password Management

22.4 Recommended Reading

22.5 Key Terms, Review Questions, and Problems

Appendix 22A The Base-Rate Fallacy

Chapter 23 Firewalls

23.1 The Need for Firewalls

23.2 Firewall Characteristics

23.3 Types of Firewalls

23.4 Firewall Basing

23.5 Firewall Location and Configurations

23.6 Recommended Reading

23.7 Key Terms, Review Questions, and Problems

Part seven Legal And Ethical Issues

Chapter 24 Legal and Ethical Issues

24.1 Cybercrime and Computer Crime

24.2 Intellectual Property

24.3 Privacy

24.4 Ethical Issues

24.5 Recommended Reading

24.6 Key Terms, Review Questions, and Problems

Appendix C Sage Exercises

Appendix D Standards and Standards-Setting Organizations

Appendix E Basic Concepts from Linear Algebra

Appendix F Measures of Security and Secrecy

Appendix G Simplified DES

Appendix H Evaluation Criteria for AES

Appendix I More on Simplified AES

Appendix J Knapsack Public-Key Algorithm

Appendix K Proof of the Digital Signature Algorithm

Appendix L TCP/IP and OSI

Appendix M Java Cryptographic APIs

Appendix N MD5 and Whirlpool Hash Functions

Appendix O Data Compression Using ZIP

Appendix P More on PGP

Appendix Q The International Reference Alphabet

Appendix R Proof of the RSA Algorithm

Appendix S Data Encryption Standard (DES)

Appendix T Kerberos Encryption Techniques

Appendix U Mathematical Basis of the Birthday Attack

Appendix V Evaluation Criteria for SHA-3

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020