O'Reilly logo

Security for Linux on System z by Sri Venkatesen, Nilesh Patel, Eric Marins, Eduardo Kienetz, William Johnston, Vic Cross, Jonathan Barney, Lydia Parziale

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Cryptographic hardware
In this chapter we describe how the System z cryptographic hardware and its functions can be used to provide value to workloads running on z/Linux.
For many years IBM has delivered products that implement cryptographic functions in specialty hardware. The functions implemented in hardware are typically a subset of those that can be utilized in software. The benefits of using hardware range to improved security, increased entropy, offloading cycles from the CP, and even acceleration. In recent years IBM has shipped the following ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required