Leveraging Integrated Cryptographic Service Facility

Leveraging Integrated Cryptographic Service Facility
Author :
Publisher : IBM Redbooks
Total Pages : 38
Release :
ISBN-10 : 9780738456553
ISBN-13 : 0738456551
Rating : 4/5 (551 Downloads)

Book Synopsis Leveraging Integrated Cryptographic Service Facility by : Lydia Parziale

Download or read book Leveraging Integrated Cryptographic Service Facility written by Lydia Parziale and published by IBM Redbooks. This book was released on 2018-01-03 with total page 38 pages. Available in PDF, EPUB and Kindle. Book excerpt: Integrated Cryptographic Service Facility (ICSF) is a part of the IBM® z/OS® operating system that provides cryptographic functions for data security, data integrity, personal identification, digital signatures, and the management of cryptographic keys. Together with the cryptography features of the IBM Z family, it provides secure, high-performance cryptographic functions (such as the loading of master key values) that enable the hardware features to be used by applications. This IBM RedpaperTM publication briefly describes ICSF and the key elements of z/OS that address different security needs. The audience for this publication is cryptographic administrators and security administrators, and those in charge of auditing security in an organization.


Leveraging Integrated Cryptographic Service Facility Related Books

Leveraging Integrated Cryptographic Service Facility
Language: en
Pages: 38
Authors: Lydia Parziale
Categories: Computers
Type: BOOK - Published: 2018-01-03 - Publisher: IBM Redbooks

GET EBOOK

Integrated Cryptographic Service Facility (ICSF) is a part of the IBM® z/OS® operating system that provides cryptographic functions for data security, data in
Getting Started with z/OS Data Set Encryption
Language: en
Pages: 274
Authors: Bill White
Categories: Computers
Type: BOOK - Published: 2021-12-10 - Publisher: IBM Redbooks

GET EBOOK

This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on I
System z Crypto and TKE Update
Language: en
Pages: 328
Authors: Karan Singh
Categories: Computers
Type: BOOK - Published: 2011-06-20 - Publisher: IBM Redbooks

GET EBOOK

This IBM® Redbooks® publication provides detailed information about the implementation of hardware cryptography in the System z10® server. We begin by summar
Microsoft Certified Exam guide - Azure Fundamentals (AZ-900)
Language: en
Pages: 315
Authors: Cybellium Ltd
Categories: Computers
Type: BOOK - Published: - Publisher: Cybellium Ltd

GET EBOOK

Microsoft Certified Exam guide - Azure Fundamentals (AZ-900) Unlock the Power of Azure with Confidence! Are you ready to embark on a journey into the world of M
IBM System i Security: Protecting i5/OS Data with Encryption
Language: en
Pages: 308
Authors: Yessong Johng
Categories: Computers
Type: BOOK - Published: 2008-07-24 - Publisher: IBM Redbooks

GET EBOOK

Regulatory and industry-specific requirements, such as SOX, Visa PCI, HIPAA, and so on, require that sensitive data must be stored securely and protected agains