S/390 Crypto PCI Implementation Guide

An IBM Redbooks publication


Abstract

This IBM Redbooks publication is designed to help you understand and implement the S/390 Cryptographic PCICC card.
Although this book is focused on the enablement of the S/390 PCICC product, cryptography and the available services on S/390 are also discussed and explained, with special attention given to the new Trusted Key Entry (TKE) workstation. Reader familiarity with the previous S/390 cryptography-related book: Exploiting S/390 Hardware Cryptography with TKE, SG24-5455, is assumed.

Table of contents

Chapter 1 Introduction
Chapter 2 PCICC product overview
Chapter 3 Planning
Chapter 4 ICSF installation, configuration and startup
Chapter 5 Customizing PCICC and CCF using a TKE V3.0
Chapter 6 Support functions
Chapter 7 Exploiting the PCICC
Appendix A Support functions: ICSF services
Appendix B TKE Host TCP/IP server setup




Profile

Publish Date
27 June 2000

Last Update
14 July 2000


Rating: Not yet rated


Author(s)

ISBN-10
0738417017

ISBN-13
9780738417011

IBM Form Number
SG24-5942-00

Number of pages
178