O'Reilly logo

Security on IBM z/VSE by Heiko Schnell, Joerg Schmidbauer, Antoinette Kaschner, Ingo Franzki, Helmut Hellner

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Cryptography on z/VSE
This chapter provides an overview of cryptography in general and its implementation in z/VSE. We describe how to prepare a z/VSE system to increase the security of your environment by using encryption technology. As cryptographic operations are by nature processor-intensive, we also discuss how to set up your environment for best benefit from the cryptographic hardware capabilities of IBM System z.
Encryption technology covers many areas, such as software-based and hardware-based encryption, securing network connections, and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required