IBM
Use your IBM ID to log in or create a new account
Quite often, formal education in cryptography focuses on the mathematics and theory of cryptographic algorithms. While this is important, ...
Instructions for safely getting non-concurrent crypto card code applied while running ICSF workloads. Assumptions: All LPARs are running ...
//FLTRSMF JOB 'DEXTER', // NOTIFY=&SYSUID,MSGLEVEL=(1,1),MSGCLASS=H, // TIME=120,REGION=4M //* //*------------------------------------------------------------------* ...
/* ------------------------------------------------------------ */ /* SAMPLE KGUP CONTROL STATEMENTS TO GENERATE AND CREATE SECURE */ /* AES DATA KEYS ...
//RECOVKDS JOB ,'EYSHA',MSGLEVEL=(1,1),REGION=0M, // MSGCLASS=H,CLASS=A,NOTIFY=&SYSUID ...
Getting started on the new Master the Mainframe - Video Series
Master the Mainframe Stories - Episode 1
Master the Mainframe Stories - Episode 2
Have you Taken Part in IBM Z's #DoubleTheMeal Coding Challenge?
What is a mainframe?
Tale of the mainframe twins
New to Z Spotlight : Anna McKee
New to Z Spotlight : Devin Berchtold
New to Z Spotlight : Eric Baumgardner
Either the content you're seeking doesn't exist or it requires proper authentication before viewing.
Multi-step process to wrap/unwrap an existing AES DATA key with AES IMPORTER/EXPORTER keys derived from ...