Further Reading: DB2 Application Patterns

IBM Documentation

DB2 for z/OS Application Programming and SQL Guide

The authoritative reference for COBOL-DB2 programming. Chapters on cursor management, dynamic SQL, and PREPARE/EXECUTE are directly relevant to this chapter's patterns. Pay particular attention to the sections on WITH HOLD behavior, scrollable cursors, and the SQLDA structure. - IBM Documentation: Db2 13 for z/OS — Application Programming and SQL Guide (SC28-1378)

DB2 for z/OS Performance Monitoring and Tuning Guide

Covers commit frequency analysis, lock escalation monitoring, and workfile consumption — the performance dimensions that underpin every pattern in this chapter. The section on batch performance tuning is essential reading for anyone designing commit-checkpoint architectures. - IBM Documentation: Db2 13 for z/OS — Managing Performance (SC28-1384)

CICS-DB2 Guide

The complete reference for the CICS-DB2 attachment facility, including DB2CONN, DB2ENTRY, thread types, and protected thread configuration. The thread management patterns in section 12.5 are drawn from the architectural principles in this guide. - IBM Documentation: CICS TS — CICS DB2 Guide (SC34-7369)

DB2 for z/OS Administration Guide — Temporal Tables

Covers system-period temporal tables, business-time temporal tables, and bitemporal tables. If you're migrating from application-managed history to temporal tables (as discussed in section 12.6), this chapter walks through the DDL, migration considerations, and query syntax. - IBM Documentation: Db2 13 for z/OS — Administration Guide (SC28-1381)

Books

DB2 Developer's Guide by Craig S. Mullins (6th Edition)

The most comprehensive single-volume reference for DB2 application development. Chapters 13 (Dynamic SQL), 14 (Cursors), and 22 (Batch Processing) directly complement this chapter. Mullins's treatment of DYNAMICRULES options and their security implications is the clearest available.

DB2 for z/OS: The Complete Reference by Susan Lawson

Lawson's coverage of partition-aware processing, utility interactions with application locks, and the WITH HOLD drain lock problem is drawn from decades of production experience. Her chapter on batch restart design is one of the few published treatments of this critical pattern.

CICS and DB2: The Complete Application Guide by Dan Luksetich

Covers the CICS-DB2 interface from both the application programmer's and the system programmer's perspective. The thread management chapters explain why protected threads matter, how to size DB2CONN parameters, and how to diagnose thread contention — all topics from section 12.5.

SQL Injection Attacks and Defense by Justin Clarke-Salt (2nd Edition)

While focused primarily on web applications and distributed databases, the foundational injection techniques apply to any platform where dynamic SQL is constructed from external input. Chapter 4 on parameterized queries directly supports the parameter marker strategy in section 12.4. The mainframe-specific sections are limited but the principles are universal.

The Art of SQL by Stéphane Faroult

Not DB2-specific, but Faroult's chapter on "Thinking in Sets" provides the theoretical foundation for understanding when set-based processing outperforms cursor-based processing (and when it doesn't). His treatment of the "row-by-agonizing-row" anti-pattern versus legitimate cursor usage is nuanced and experienced.

IBM Redbooks

DB2 for z/OS: Application Design Guidelines for High Performance

IBM Redbook SG24-8478. Covers commit frequency optimization, cursor design for batch and online, and dynamic SQL performance. The benchmarks in this Redbook informed the commit interval guidance in section 12.2.

Batch Modernization on z/OS

IBM Redbook SG24-7779. Covers parallel batch processing, partition-aware job design, and batch window optimization. The JCL patterns for multi-partition parallel processing align with the approach described in CNB's case study.

DB2 for z/OS: Temporal Data Management

IBM Redbook SG24-8316. A thorough treatment of temporal table design, migration from application-managed history, and point-in-time query patterns. Directly relevant to section 12.6's temporal table discussion.

Security in DB2 for z/OS

IBM Redbook SG24-8460. Covers DYNAMICRULES, authorization models, and audit frameworks for DB2. The dynamic SQL security sections complement the five-layer strategy in section 12.4.

Technical Articles and Papers

"Optimizing DB2 Batch Processing: A Practitioner's Guide"

Published in IBM Systems Magazine (now Destination z). Covers real-world commit interval tuning, restart design patterns, and partition-aware processing with case studies from financial services shops. The commit interval benchmarks corroborate the 500-5,000 row guidance.

"SQL Injection on the Mainframe: An Underestimated Threat"

Published by the SHARE user group. Documents actual SQL injection vulnerabilities found in mainframe COBOL applications, including the same patterns identified in SecureFirst's audit (case study 2). The remediation recommendations align with the five-layer defense strategy.

"CICS-DB2 Thread Management: From Theory to Practice"

SHARE conference presentation (available in SHARE proceedings). Walks through DB2CONN sizing methodology, protected thread analysis, and thread contention diagnosis with production monitoring examples.

  • Chapter 6: The DB2 Optimizer — Access path selection governs the performance of every cursor in this chapter. Review EXPLAIN analysis and index selection before designing cursor pools.
  • Chapter 7: Advanced SQL — MERGE, INSERT ... SELECT, and set-based operations appear throughout this chapter. Common table expressions are useful in complex dynamic SQL construction.
  • Chapter 8: Locking and Concurrency — Lock escalation thresholds, isolation levels, and deadlock handling are foundational to commit interval design and the retry logic for SQLCODE -911/-913.
  • Chapter 9: CICS Transaction Design — Pseudo-conversational patterns and SYNCPOINT management provide the CICS context for cursor pools and thread management.
  • Chapter 11: Performance Monitoring — The monitoring techniques from Chapter 11 are how you validate that the patterns from this chapter are working as designed in production.
  • Chapter 13: Stored Procedures (next) — Stored procedures and UDFs move logic into DB2, which has implications for thread management, dynamic SQL, and cursor lifecycle that build on this chapter's patterns.

Online Resources

IBM DB2 for z/OS Knowledge Center

The current online documentation set for DB2 for z/OS. Searchable, regularly updated, and includes syntax diagrams for every SQL statement discussed in this chapter. Bookmark the sections on DECLARE CURSOR, PREPARE, EXECUTE, and DESCRIBE.

IDUG (International DB2 Users Group)

The DB2 user community. Annual conferences and regional events include deep technical sessions on batch optimization, cursor management, and security. The IDUG Solutions Journal publishes peer-reviewed articles on production DB2 patterns.

SHARE Association

The enterprise computing user group. SHARE proceedings include hundreds of technical presentations on COBOL-DB2 programming, CICS-DB2 integration, and mainframe security. Search the proceedings archive for "batch processing," "dynamic SQL security," and "thread management."