Skip to main content

S/390 Crypto PCI Implementation Guide

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 27 June 2000, updated 14 July 2000

  1. .PDF (2.1 MB)


Share this page:   

ISBN-10: 0738417017
ISBN-13: 9780738417011
IBM Form #: SG24-5942-00


Authors: Moon Kim

    menu icon

    Abstract

    This IBM Redbooks publication is designed to help you understand and implement the S/390 Cryptographic PCICC card.

    Although this book is focused on the enablement of the S/390 PCICC product, cryptography and the available services on S/390 are also discussed and explained, with special attention given to the new Trusted Key Entry (TKE) workstation. Reader familiarity with the previous S/390 cryptography-related book: Exploiting S/390 Hardware Cryptography with TKE, SG24-5455, is assumed.

    Table of Contents

    Chapter 1 Introduction

    Chapter 2 PCICC product overview

    Chapter 3 Planning

    Chapter 4 ICSF installation, configuration and startup

    Chapter 5 Customizing PCICC and CCF using a TKE V3.0

    Chapter 6 Support functions

    Chapter 7 Exploiting the PCICC

    Appendix A Support functions: ICSF services

    Appendix B TKE Host TCP/IP server setup

     

    Others who read this also read