Chapter 35: Further Reading

IBM Official Documentation

  • z/OS Connect EE Documentation — IBM Knowledge Center: Complete reference for z/OS Connect Enterprise Edition including API Toolkit usage, service archive creation, Liberty server configuration, and security setup.
  • https://www.ibm.com/docs/en/zos-connect

  • Db2 REST Services — IBM documentation for enabling and creating REST services on Db2 for LUW, including service registration, authentication, and HTTPS configuration.

  • https://www.ibm.com/docs/en/db2/11.5?topic=services-rest

  • IBM InfoSphere Data Replication — Documentation for configuring CDC (Change Data Capture) on DB2 for z/OS and LUW, including log-based capture, apply agents, and Kafka integration.

Books

  • Richardson, Chris. "Microservices Patterns: With Examples in Java." Manning Publications. Essential reading for understanding saga pattern, CQRS, event sourcing, and database-per-service pattern. Chapter 4 on sagas and Chapter 7 on queries in microservices are directly applicable.

  • Kleppmann, Martin. "Designing Data-Intensive Applications." O'Reilly. The definitive reference for understanding event streaming, change data capture, exactly-once semantics, and distributed system patterns. Chapters 11 (Stream Processing) and 12 (The Future of Data Systems) are particularly relevant.

  • Newman, Sam. "Building Microservices." O'Reilly. Practical guidance on designing microservices that interact with legacy databases, including the strangler fig pattern for incremental modernization.

  • Siriwardena, Prabath. "Advanced API Security." Apress. Comprehensive coverage of OAuth2, JWT, API key management, and rate limiting — all applied to API security over enterprise databases.

IBM Redbooks

  • SG24-8481: "z/OS Connect Enterprise Edition V3" — Step-by-step implementation guide for z/OS Connect, including real-world examples of exposing DB2 stored procedures as REST APIs, with security configuration and performance tuning.

  • SG24-8369: "Modernizing Applications with IBM z/OS Connect" — Patterns for API-enabling mainframe applications, including DB2, CICS, and IMS backends. Covers the API economy and developer portal setup.

  • SG24-8418: "IBM Event Streams (Kafka) on z/OS" — Guide to running Kafka on z/OS for event-driven architectures with DB2, including CDC integration patterns.

Kafka and Event Streaming

  • Debezium Documentation — Complete guide to the Debezium DB2 connector, including setup, configuration options, event format, and troubleshooting.
  • https://debezium.io/documentation/reference/connectors/db2.html

  • Narkhede, Neha; Shapira, Gwen; Palino, Todd. "Kafka: The Definitive Guide." O'Reilly. Comprehensive guide to Apache Kafka, including Kafka Connect, exactly-once semantics, and production operations.

  • Stopford, Ben. "Designing Event-Driven Systems." O'Reilly (free download from Confluent). Patterns for event-driven architectures including event sourcing, CQRS, and stream processing. Directly applicable to the Kafka + DB2 patterns in this chapter.

GraphQL

  • GraphQL Official Documentation — The specification and best practices for GraphQL API design.
  • https://graphql.org/learn/

  • Buna, Samer. "GraphQL in Action." Manning Publications. Practical guide to implementing GraphQL APIs, including database integration, N+1 problem solutions, and DataLoader pattern.

  • Principled GraphQL — Best practices from Apollo (the leading GraphQL platform) for designing production GraphQL APIs.

  • https://principledgraphql.com/

API Design

  • "REST API Design Rulebook" by Mark Masse. O'Reilly. Concise reference for RESTful API design principles including resource naming, HTTP method semantics, error handling, and pagination.

  • OpenAPI Specification — The standard for defining REST APIs. z/OS Connect generates OpenAPI specs automatically; understanding the format helps customize and extend them.

  • https://spec.openapis.org/oas/latest.html
  • Chapter 19: Security and Authorization — DB2's authorization model underpins API security. RACF integration with z/OS Connect, EXECUTE privileges for stored procedures, and role-based access control all originate from Chapter 19's security framework.

  • Chapter 33: Application Programming with JDBC, ODBC, and Embedded SQL — The JDBC connection pools and prepared statement patterns used by REST APIs in this chapter build on Chapter 33's programming foundations.

  • Chapter 34: Stored Procedures, UDFs, and Application Logic in the Database — Every API endpoint in this chapter calls a stored procedure from Chapter 34. The API layer is the HTTP interface; the stored procedures are the business logic.

  • Chapter 36: Performance Monitoring and Tuning for Applications — Monitoring API response times, connection pool utilization, and query performance ties directly into Chapter 36's performance management framework.