S/390 Crypto PCI Implementation Guide
An IBM Redbooks publication
Note: This is publication is now archived. For reference only.
This IBM Redbooks publication is designed to help you understand and implement the S/390 Cryptographic PCICC card.
Although this book is focused on the enablement of the S/390 PCICC product, cryptography and the available services on S/390 are also discussed and explained, with special attention given to the new Trusted Key Entry (TKE) workstation. Reader familiarity with the previous S/390 cryptography-related book: Exploiting S/390 Hardware Cryptography with TKE, SG24-5455, is assumed.
Chapter 1 Introduction
Chapter 2 PCICC product overview
Chapter 3 Planning
Chapter 4 ICSF installation, configuration and startup
Chapter 5 Customizing PCICC and CCF using a TKE V3.0
Chapter 6 Support functions
Chapter 7 Exploiting the PCICC
Appendix A Support functions: ICSF services
Appendix B TKE Host TCP/IP server setup