Home > Store

Advanced Programming in the UNIX Environment, 2nd Edition

Register your product to gain access to bonus material or receive a coupon.

Advanced Programming in the UNIX Environment, 2nd Edition

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

A major revision of the definitive guide to Unix system programming with sales exceeding 160,000 units!

° Describes and illustrates more than 200 system calls - the interface that programmers must master in order to access all major Unix internal resources.

° New Edition covers the final POSIX.1 standard as well as threads and multi-threaded programming.

° Includes all new examples, over 10,000 lines of code, running on Linux, Solaris, Free BSD and MAC OS X.

Description

  • Copyright 2005
  • Edition: 2nd
  • Book
  • ISBN-10: 0-201-43307-9
  • ISBN-13: 978-0-201-43307-4

"Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations of UNIX and UNIX-like environments. And yet, it does all this while retaining the style and taste of the original classic."

--Mukesh Kacker, cofounder and former CTO of Pronto Networks, Inc.

"One of the essential classics of UNIX programming."

--Eric S. Raymond, author of The Art of UNIX Programming

"This is the definitive reference book for any serious or professional UNIX systems programmer. Rago has updated and extended the classic Stevens text while keeping true to the original. The APIs are illuminated by clear examples of their use. He also mentions many of the pitfalls to look out for when programming across different UNIX system implementations and points out how to avoid these pitfalls using relevant standards such as POSIX 1003.1, 2004 edition and the Single UNIX Specification, Version 3."

--Andrew Josey, Director, Certification, The Open Group, and Chair of the POSIX 1003.1 Working Group

"Advanced Programming in the UNIX® Environment, Second Edition, is an essential reference for anyone writing programs for a UNIX system. It's the first book I turn to when I want to understand or re-learn any of the various system interfaces. Stephen Rago has successfully revised this book to incorporate newer operating systems such as GNU/Linux and Apple's OS X while keeping true to the first edition in terms of both readability and usefulness. It will always have a place right next to my computer."

--Dr. Benjamin Kuperman, Swarthmore College

Praise for the First Edition

"Advanced Programming in the UNIX® Environment is a must-have for any serious C programmer who works under UNIX. Its depth, thoroughness, and clarity of explana-tion are unmatched."

--UniForum Monthly

"Numerous readers recommended Advanced Programming in the UNIX® Environment by W. Richard Stevens (Addison-Wesley), and I'm glad they did; I hadn't even heard of this book, and it's been out since 1992. I just got my hands on a copy, and the first few chapters have been fascinating."

--Open Systems Today

"A much more readable and detailed treatment of UNIX internals can be found in Advanced Programming in the UNIX® Environment by W. Richard Stevens (Addison-Wesley). This book includes lots of realistic examples, and I find it quite helpful when I have systems programming tasks to do."

--RS/Magazine

"This is the definitive reference book for any serious or professional UNIX systems programmer. Rago has updated and extended the original Stevens classic while keeping true to the original."

--Andrew Josey, Director, Certification, The Open Group, and Chair of the POSIX 1003.1 Working Group

For over a decade, serious C programmers have relied on one book for practical, in-depth knowledge of the programming interfaces that drive the UNIX and Linux kernels: W. Richard Stevens' Advanced Programming in the UNIX® Environment. Now, Stevens' colleague Stephen Rago has thoroughly updated this classic to reflect the latest technical advances and add support for today's leading UNIX and Linux platforms.

Rago carefully retains the spirit and approach that made this book a classic. Building on Stevens' work, he begins with basic topics such as files, directories, and processes, carefully laying the groundwork for understanding more advanced techniques, such as signal handling and terminal I/O.

Substantial new material includes chapters on threads and multithreaded programming, using the socket interface to drive interprocess communication (IPC), and extensive coverage of the interfaces added to the latest version of the POSIX.1 standard. Nearly all examples have been tested on four of today's most widely used UNIX/Linux platforms: FreeBSD 5.2.1; the Linux 2.4.22 kernel; Solaris 9; and Darwin 7.4.0, the FreeBSD/Mach hybrid underlying Apple's Mac OS X 10.3.

As in the first edition, you'll learn through example, including more than 10,000 lines of downloadable, ANSI C source code. More than 400 system calls and functions are demonstrated with concise, complete programs that clearly illustrate their usage, arguments, and return values. To tie together what you've learned, the book presents several chapter-length case studies, each fully updated for contemporary environments.

Advanced Programming in the UNIX® Environment has helped a generation of programmers write code with exceptional power, performance, and reliability. Now updated for today's UNIX/Linux systems, this second edition will be even more indispensable.



Downloads

Sample Files

The following download is a Supplemental Chapter from the book.

Extras

Related Articles

Active Directory Solutions for Linux

POSIX Asynchronous I/O

Author's Site

Visit the Author's Web Site related to this title.

Sample Content

Table of Contents

Foreword.

Preface.

Preface to the First Edition.

1. UNIX System Overview.

    Introduction.

    UNIX Architecture.

    Logging In.

    Files and Directories.

    Input and Output.

    Programs and Processes.

    Error Handling.

    User Identification.

    Signals.

    Time Values.

    System Calls and Library Functions.

    Summary.

2. UNIX Standardization and Implementations.

    Introduction.

    UNIX Standardization.

    UNIX System Implementations.

    Relationship of Standards and Implementations.

    Limits.

    Options.

    Feature Test Macros.

    Primitive System Data Types.

    Conflicts Between Standards.

    Summary.

3. File I/O.

    Introduction.

    File Descriptors.

    open Function.

    creat Function.

    closeFunction.

    lseek Function.

    read Function.

    write Function.

    I/O Efficiency.

    File Sharing.

    Atomic Operations.

    dup and dup2 Functions.

    sync, fsync, and fdatasync Functions.

    fcntl Function.

    ioctl Function.

    /dev/fd.

    Summary.

4. Files and Directories.

    Introduction.

    stat, fstat, and lstat Functions.

    File Types.

    Set-User-ID and Set-Group-ID.

    File Access Per missions.

    Ownership of New Files and Directories.

    access Function.

    umask Function.

    chmodand fchmod Functions.

    Sticky Bit.

    chown, fchown, and lchown Functions.

    File Size.

    File Truncation.

    File Systems.

    link, unlink, remove, and rename Functions.

    Symbolic Links.

    symlinkand readlink Functions.

    File Times.

    utime Function.

    mkdirand rmdir Functions.

    Reading Director ies.

    chdir, fchdir, and getcwd Functions.

    Device Special Files.

    Summary of File Access Per mission Bits.

    Summary.

5. Standard I/O Library.

    Introduction.

    Streams and FILE Objects.

    Standard Input, Standard Output, and Standard Error.

    Buffering.

    Opening a Stream.

    Reading and Writing a Stream.

    Line-at-a-Time I/O.

    Standard I/O Efficiency.

    Binary I/O.

    Positioning a Stream.

    Formatted I/O.

    Implementation Details.

    Temporary Files.

    Alternatives to Standard I/O.

    Summary.

6. System Data Files and Information.

    Introduction.

    Password File.

    Shadow Passwords.

    Group File.

    Supplementary Group Ids.

    Implementation Differences.

    Other Data Files.

    Login Accounting.

    System Identification.

    Time and Date Routines.

    Summary.

7. Process Environment.

    Introduction.

    main Function.

    Process Termination.

    Command-Line Arguments.

    Environment List.

    Memory Layout of a C Program.

    Shared Libraries.

    Memory Allocation.

    Environment Variables.

    setjmp and longjmp Functions.

    getrlimit and setrlimit Functions.

    Summary.

8. Process Control.

    Introduction.

    Process Identifiers.

    fork Function.

    vfork Function.

    exit Functions.

    waitand waitpid Functions.

    waitid Function.

    wait3and wait4Functions.

    Race Conditions.

    exec Functions.

    Changing User IDs and Group IDs.

    Interpreter Files.

    system Function.

    Process Accounting.

    User Identification.

    Process Times.

    Summary.

9. Process Relationships.

    Introduction.

    Terminal Logins.

    Network Logins.

    Process Groups.

    Sessions.

    Controlling Terminal.

    tcgetpgrp, tcsetpgrp, and tcgetsid Functions.

    Job Control.

    Shell Execution of Programs.

    Orphaned Process Groups.

    FreeBSD Implementation.

    Summary.

10. Signals.

    Introduction.

    Signal Concepts.

    signal Function.

    Unreliable Signals.

    Interrupted System Calls.

    Reentrant Functions.

    SIGCLD Semantics.

    Reliable-Signal Terminology and Semantics.

    killand raise Functions.

    alarmand pause Functions.

    Signal Sets.

    sigprocmask Function.

    sigpending Function.

    sigaction Function.

    sigsetjmp and siglongjmp Functions.

    sigsuspend Function.

    abort Function.

    system Function.

    sleep Function.

    Job-Control Signals.

    Additional Features.

    Summary.

11. Threads.

    Introduction.

    Thread Concepts.

    Thread Identification.

    Thread Creation.

    Thread Termination.

    Thread Synchronization.

    Summary.

12. Thread Control.

    Introduction.

    Thread Limits.

    hread Attributes.

    Synchronization Attributes.

    Reentrancy.

    Thread-Specific Data.

    Cancel Options.

    Threads and Signals.

    Threads and fork.

    Threads and I/O.

    Summary.

13. Daemon Processes.

    Introduction.

    Daemon Characteristics.

    Coding Rules.

    Error Logging.

    Single-Instance Daemons.

    Daemon Conventions.

    Client-Server Model.

    Summary.

14. Advanced I/O.

    Introduction.

    Nonblocking I/O.

    Record Locking.

    STREAMS.

    I/O Multiplexing.

    2 poll Function.

    Asynchronous I/O.

    readv and writev Functions.

    readn and written Functions.

    Memory-Mapped I/O.

    Summary.

15. Interprocess Communication.

    Introduction.

    Pipes.

    popen and pclose Functions.

    Coprocesses.

    FIFOs.

    XSI IPC.

    Message Queues.

    Semaphores.

    Shared Memory.

    Client-Server Properties.

    Summary.

16. Network IPC: Sockets.

    Introduction.

    Socket Descriptors.

    Addressing.

    Connection Establishment.

    Data Transfer.

    Socket Options.

    Out-of-Band Data.

    Nonblocking and Asynchronous I/O.

    Summary.

17 Advanced IPC.

    Introduction.

    STREAMS-Based Pipes.

    Unique Connections.

    Passing File Descriptors.

    An Open Server, Version 1.

    An Open Server, Version 2.

    Summary.

18. Terminal I/O.

    Introduction.

    Overview.

    Special Input Characters.

    Getting and Setting Terminal Attributes.

    Terminal Option Flags.

    stty Command.

    Baud Rate Functions.

    Line Control Functions.

    Terminal Identification.

    Canonical Mode.

    Noncanonical Mode.

    Terminal Window Size.

    termcap, terminfo, and curses.

    Summary.

19. Pseudo Terminals.

    Introduction.

    Overview.

    Opening Pseudo-Terminal Devices.

    pty_fork Function.

    pty Program.

    Using the pty Program.

    Advanced Features.

    Summary.

20. A Database Library.

    Introduction.

    History.

    The Library.

    Implementation Overview.

    Centralized or Decentralized?

    Concurrency.

    Building the Library.

    Source Code.

    Performance.

    Summary.

21. Communicating with a Network Printer.

    Introduction.

    The Inter net Printing Protocol.

    The Hypertext Transfer Protocol.

    Printer Spooling.

    Source Code.

    Summary.

Appendix A. Function Prototypes.

Appendix B. Miscellaneous Source Code.

    Our Header File.

    Standard Error Routines.

Appendix C. Solutions to Selected Exercises.

Bibliography.

Index.

Preface

Untitled Document

Introduction

Rich Stevens and I first met through an e-mail exchange when I reported a typographical error in his first book, UNIX Network Programming. He used to kid me about being the person to send him his first errata notice for the book. Until his death in 1999, we exchanged e-mail irregularly, usually when one of us had a question we thought the other might be able to answer. We met for dinner at USENIX conferences and when Rich was teaching in the area.

Rich Stevens was a friend who always conducted himself as a gentleman. When I wrote UNIX System V Network Programming in 1993, I intended it to be a System V version of Rich's UNIX Network Programming. As was his nature, Rich gladly reviewed chapters for me, and treated me not as a competitor, but as a colleague. We often talked about collaborating on a STREAMS version of his TCP/IP Illustrated book. Had events been different, we might have actually done it, but since Rich is no longer with us, revising Advanced Programming in the UNIX Environment is the closest I'll ever get to writing a book with him.

When the editors at Addison-Wesley told me that they wanted to update Rich's book, I thought that there wouldn't be too much to change. Even after 13 years, Rich's work still holds up well. But the UNIX industry is vastly different today from what it was when the book was first published.

  • The System V variants are slowly being replaced by Linux. The major system vendors that ship their hardware with their own versions of the UNIX System have either made Linux ports available or announced support for Linux. Solaris is perhaps the last descendant of UNIX System V Release 4 with any appreciable market share.
  • After 4.4BSD was released, the Computing Science Research Group (CSRG) from the University of California at Berkeley decided to put an end to its development of the UNIX operating system, but several different groups of volunteers still maintain publicly available versions.
  • The introduction of Linux, supported by thousands of volunteers, has made it possible for anyone with a computer to run an operating system similar to the UNIX System, with freely available source code for the newest hardware devices. The success of Linux is something of a curiosity, given that several free BSD alternatives are readily available.
  • Continuing its trend as an innovative company, Apple Computer abandoned its old Mac operating system and replaced it with one based on Mach and FreeBSD.

Thus, I've tried to update the information presented in this book to reflect these four platforms.

After Rich wrote Advanced Programming in the UNIX Environment in 1992, I got rid of most of my UNIX programmer 's manuals. To this day, the two books I keep closest to my desk are a dictionary and a copy of Advanced Programming in the UNIX Environment. I hope you find this revision equally useful.

Changes from the First Edition

Rich's work holds up well. I've tried not to change his original vision for this book, but a lot has happened in 13 years. This is especially true with the standards that affect the UNIX programming interface.

Throughout the book, I've updated interfaces that have changed from the ongoing efforts in standards organizations. This is most noticeable in Chapter 2, since its primary topic is standards. The 2001 version of the POSIX.1 standard, which we use in this revision, is much more comprehensive than the 1990 version on which the first edition of this book was based. The 1990 ISO C standard was updated in 1999, and some changes affect the interfaces in the POSIX.1 standard.

A lot more interfaces are now covered by the POSIX.1 specification. The base specifications of the Single UNIX Specification (published by The Open Group, formerly X/Open) have been merged with POSIX.1. POSIX.1 now includes several 1003.1 standards and draft standards that were formerly published separately. Accordingly, I've added chapters to cover some new topics. Threads and multithreaded programming are important concepts because they present a cleaner way for programmers to deal with concurrency and asynchrony.

The socket interface is now part of POSIX.1. It provides a single interface to interprocess communication (IPC), regardless of the location of the process, and is a natural extension of the IPC chapters.

I've omitted most of the real-time interfaces that appear in POSIX.1. These are best treated in a text devoted to real-time programming. One such book appears in the bibliography.

I've updated the case studies in the last chapters to cover more relevant real-world examples. For example, few systems these days are connected to a PostScript printer via a serial or parallel port. Most PostScript printers today are accessed via a network, so I've changed the case study that deals with PostScript printer communication to take this into account.

The chapter on modem communication is less relevant these days. So that the original material is not lost, however, it is available on the book's Web site in two formats: PostScript (http://www.apuebook.com/lostchapter/modem.ps) and PDF (http://www.apuebook.com/lostchapter/modem.pdf).

The source code for the examples shown in this book is also available at www.apuebook.com. Most of the examples have been run on four platforms:

  1. FreeBSD 5.2.1, a derivative of the 4.4BSD release from the Computer Systems Research Group at the University of California at Berkeley, running on an Intel Pentium processor
  2. Linux 2.4.22 (the Mandrake 9.2 distribution), a free UNIX-like operating system, running on Intel Pentium processors
  3. Solaris 9, a derivative of System V Release 4 from Sun Microsystems, running on a64-bit UltraSPARC IIi processor
  4. Darwin 7.4.0, an operating environment based on FreeBSD and Mach, supported by Apple Mac OS X, version 10.3, on a PowerPC processor

Stephen A. Rago
Warren, New Jersey
April 2005
sar@apuebook.com

Preface to the First Edition

Introduction
This book describes the programming interface to the Unix system--the system call interface and many of the functions provided in the standard C library. It is intended for anyone writing programs that run under Unix.

Like most operating systems, Unix provides numerous services to the programs that are running -- open a file, read a file, start a new program, allocate a region of memory, get the current time-of-day, and so on. This has been termed the system call interface. Additionally, the standard C library provides numerous functions that are used by almost every C program (format a variable's value for output, compare two strings, etc.).

The system call interface and the library routines have traditionally been described in Sections 2 and 3 of the Unix Programmer 's Manual. This book is not a duplication of these sections. Examples and rationale are missing from the Unix Programmer 's Manual, and that's what this book provides.

Unix Standards
The proliferation of different versions of Unix during the 1980s has been tempered by the various international standards that were started during the late 1980s. These include the ANSI standard for the C programming language, the IEEE POSIX family (still being developed), and the X/Open portability guide. This book also describes these standards. But instead of just describing the standards by themselves, we describe them in relation to popular implementations of the standards -- System V Release 4 and the forthcoming 4.4BSD. This provides a real-world description, which is often lacking from the standard itself and from books that describe only the standard.

Organization of the Book
This book is divided into six parts:

An overview and introduction to basic Unix programming concepts and terminology (Chapter 1), with a discussion of the various Unix standardization efforts and different Unix implementations (Chapter 2).

  1. I/O--unbuffered I/O (Chapter 3), properties of files and directories (Chapter 4), the standard I/O library (Chapter 5), and the standard system data files (Chapter 6).
  2. Processes -- the environment of a Unix process (Chapter 7), process control (Chapter 8), the relationships between different processes (Chapter 9), and signals (Chapter 10).
  3. More I/O -- terminal I/O (Chapter 11), advanced I/O (Chapter 12), and daemon processes (Chapter 13).
  4. IPC--Interprocess communication (Chapters 14 and 15).
  5. Examples--a database library (Chapter 16), communicating with a PostScript printer (Chapter 17), a modem dialing program (Chapter 18), and using pseudo terminals (Chapter 19).

A reading familiarity with C would be beneficial as would some experience using Unix. No prior programming experience with Unix is assumed. This text is intended for programmers familiar with Unix and programmers familiar with some other operating system who wish to learn the details of the services provided by most Unix systems.

Examples in the Text
This book contains many examples--approximately 10,000 lines of source code. All the examples are in the C programming language. Furthermore, these examples are in ANSI C. You should have a copy of the Unix Programmer's Manual for your system handy while reading this book, since reference is made to it for some of the more esoteric and implementation-dependent features.

Almost every function and system call is demonstrated with a small, complete program. This lets us see the arguments and return values and is often easier to comprehend than the use of the function in a much larger program. But since some of the small programs are contrived examples, a few bigger examples are also included (Chapters 16, 17, 18, and 19). These larger examples demonstrate the programming techniques in larger, real-world examples.

Systems Used to Test the Examples
Unfortunately all operating systems are moving targets. Unix is no exception. The following diagram shows the recent evolution of the various versions of System V and 4.xBSD.

4.xBSD are the various systems from the Computer Systems Research Group at the University of California at Berkeley. This group also distributes the BSD Net 1 and BSD Net 2 releases -- publicly available source code from the 4.xBSD systems. SVRx refers to System V Release x from AT&T. XPG3 is the X/Open Portability Guide, Issue 3, and ANSI C is the ANSI standard for the C programming language. POSIX.1 is the IEEE and ISO standard for the interface to a Unix-like system. We'll have more to say about these different standards and the various versions of Unix in Sections 2.2 and 2.3.

In this text we use the term 4.3+BSDto refer to the Unix system from Berkeley that is somewhere between the BSD Net 2 release and 4.4BSD. At the time of this writing, 4.4BSD was not released, so the system could not be called 4.4BSD. Nevertheless a simple name was needed to refer to this system and 4.3+BSD is used throughout the text.

Most of the examples in this text have been run on four different versions of Unix:

Unix System V/386 Release 4.0 Version 2.0 (''vanilla SVR4'') from U.H. Corp. (UHC), on an Intel 80386 processor.

  1. 4.3+BSD at the Computer Systems Research Group, Computer Science Division, University of California at Berkeley, on a Hewlett Packard workstation.
  2. BSD/386 (a derivative of the BSD Net 2 release) from Berkeley Software Design, Inc., on an Intel 80386 processor. This system is almost identical to what we call 4.3+BSD.
  3. SunOS 4.1.1 and 4.1.2 (systems with a strong Berkeley heritage but many System V features) from Sun Microsystems, on a SPARCstation SLC.

Numerous timing tests are provided in the text and the systems used for the test are identified.

W. Richard Stevens
Tucson, Arizona
April 1992

Foreword

Download the Foreword file related to this title.

Index

Download the Index file related to this title.

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020