© Copyright IBM Corp. 2005. All rights reserved. 155
Appendix B. APPC exploiter sample source
This appendix provides an overview of the sample source used during the redbook exercise.
This appendix provides descriptions for the CICS and IMS source programs. The samples
referred to here are provided on an as-is basis and can be downloaded from the redbook
Web site. You can use these samples as the building blocks for developing an APPC
Refer to Appendix C, “Additional material” on page 161 for further information on obtaining
source code.

Get Implementing and Managing APPC Protected Conversations now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.