Chapter 35: Further Reading
IBM Official Documentation
- z/OS Connect EE Documentation — IBM Knowledge Center: Complete reference for z/OS Connect Enterprise Edition including API Toolkit usage, service archive creation, Liberty server configuration, and security setup.
-
https://www.ibm.com/docs/en/zos-connect
-
Db2 REST Services — IBM documentation for enabling and creating REST services on Db2 for LUW, including service registration, authentication, and HTTPS configuration.
-
https://www.ibm.com/docs/en/db2/11.5?topic=services-rest
-
IBM InfoSphere Data Replication — Documentation for configuring CDC (Change Data Capture) on DB2 for z/OS and LUW, including log-based capture, apply agents, and Kafka integration.
Books
-
Richardson, Chris. "Microservices Patterns: With Examples in Java." Manning Publications. Essential reading for understanding saga pattern, CQRS, event sourcing, and database-per-service pattern. Chapter 4 on sagas and Chapter 7 on queries in microservices are directly applicable.
-
Kleppmann, Martin. "Designing Data-Intensive Applications." O'Reilly. The definitive reference for understanding event streaming, change data capture, exactly-once semantics, and distributed system patterns. Chapters 11 (Stream Processing) and 12 (The Future of Data Systems) are particularly relevant.
-
Newman, Sam. "Building Microservices." O'Reilly. Practical guidance on designing microservices that interact with legacy databases, including the strangler fig pattern for incremental modernization.
-
Siriwardena, Prabath. "Advanced API Security." Apress. Comprehensive coverage of OAuth2, JWT, API key management, and rate limiting — all applied to API security over enterprise databases.
IBM Redbooks
-
SG24-8481: "z/OS Connect Enterprise Edition V3" — Step-by-step implementation guide for z/OS Connect, including real-world examples of exposing DB2 stored procedures as REST APIs, with security configuration and performance tuning.
-
SG24-8369: "Modernizing Applications with IBM z/OS Connect" — Patterns for API-enabling mainframe applications, including DB2, CICS, and IMS backends. Covers the API economy and developer portal setup.
-
SG24-8418: "IBM Event Streams (Kafka) on z/OS" — Guide to running Kafka on z/OS for event-driven architectures with DB2, including CDC integration patterns.
Kafka and Event Streaming
- Debezium Documentation — Complete guide to the Debezium DB2 connector, including setup, configuration options, event format, and troubleshooting.
-
https://debezium.io/documentation/reference/connectors/db2.html
-
Narkhede, Neha; Shapira, Gwen; Palino, Todd. "Kafka: The Definitive Guide." O'Reilly. Comprehensive guide to Apache Kafka, including Kafka Connect, exactly-once semantics, and production operations.
-
Stopford, Ben. "Designing Event-Driven Systems." O'Reilly (free download from Confluent). Patterns for event-driven architectures including event sourcing, CQRS, and stream processing. Directly applicable to the Kafka + DB2 patterns in this chapter.
GraphQL
- GraphQL Official Documentation — The specification and best practices for GraphQL API design.
-
https://graphql.org/learn/
-
Buna, Samer. "GraphQL in Action." Manning Publications. Practical guide to implementing GraphQL APIs, including database integration, N+1 problem solutions, and DataLoader pattern.
-
Principled GraphQL — Best practices from Apollo (the leading GraphQL platform) for designing production GraphQL APIs.
- https://principledgraphql.com/
API Design
-
"REST API Design Rulebook" by Mark Masse. O'Reilly. Concise reference for RESTful API design principles including resource naming, HTTP method semantics, error handling, and pagination.
-
OpenAPI Specification — The standard for defining REST APIs. z/OS Connect generates OpenAPI specs automatically; understanding the format helps customize and extend them.
- https://spec.openapis.org/oas/latest.html
Related Chapters in This Book
-
Chapter 19: Security and Authorization — DB2's authorization model underpins API security. RACF integration with z/OS Connect, EXECUTE privileges for stored procedures, and role-based access control all originate from Chapter 19's security framework.
-
Chapter 33: Application Programming with JDBC, ODBC, and Embedded SQL — The JDBC connection pools and prepared statement patterns used by REST APIs in this chapter build on Chapter 33's programming foundations.
-
Chapter 34: Stored Procedures, UDFs, and Application Logic in the Database — Every API endpoint in this chapter calls a stored procedure from Chapter 34. The API layer is the HTTP interface; the stored procedures are the business logic.
-
Chapter 36: Performance Monitoring and Tuning for Applications — Monitoring API response times, connection pool utilization, and query performance ties directly into Chapter 36's performance management framework.