Cryptography on z/VSE
This chapter provides an overview of cryptography in general and its implementation in z/VSE. We describe how to prepare a z/VSE system to increase the security of your environment by using encryption technology. As cryptographic operations are by nature processor-intensive, we also discuss how to set up your environment for best benefit from the cryptographic hardware capabilities of IBM System z.
Encryption technology covers many areas, such as software-based and hardware-based encryption, securing network connections, and ...
Get Security on IBM z/VSE now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.