Skip to main content

Infrastructure Patterns

  • Chapter
  • First Online:
Enterprise Architecture Patterns
  • 4334 Accesses

Abstract

In this chapter, we present five patterns that provide services for all the other patterns in this book. The services are often not directly visible to end-users, but are essentials for the effective and efficient functioning of an ICT environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Ballad B, Ballad T, Banks E (2010) Access control, authentication, and public key infrastructure. Jones and Bartlett Learning

    Google Scholar 

  • Buecker A, Browne K, Foss L, Jacobs J, Jeremic V, Lorenz C, Stabler C, Van Herzele J (2011) IBM security solutions architecture for network, server and endpoint. IBM International Technical Support Organization, Poughkeepsie

    Google Scholar 

  • Chaffin L, Kanclirz J, Porter T et al (2006) Practical VoIP security. Syngress, Rockland

    Google Scholar 

  • Ciampa M (2009) Security + guide to network security fundamentals. Course Technology/ Cengage Learning Boston

    Google Scholar 

  • Hucaby D, Garneau D, Sequeira A (2012) CCNP security firewall 642–618 official cert guide. Cisco Press, Indianapolis

    Google Scholar 

  • iDABC (2007) eID interoperability for PEGS. http://ec.europa.eu/idabc/en/document/6484.html. Accessed 24 Aug 2011

  • ISACA (2012) Glossary of terms. ISACA, Rolling Meadows

    Google Scholar 

  • ISO (2007) ISO/IEC 27002:2005 information technology – security techniques – code of practice for information security management. International Organization for Standardization, Geneva

    Google Scholar 

  • Kizza M (2008) A guide to computer network security. Springer, Berlin

    Google Scholar 

  • Mezler-Andelberg C (2008) Identity management – eine Einführung. Grundlagen, Technik, wirtschaftlicher Nutzen. dPunkt-Verlag

    Google Scholar 

  • Mullet D, Mullet K (2000) Managing Imap. O’Reilly, Sebastopol

    Google Scholar 

  • Precht R (2011) Who am I and if so how many. Constable & Robinson Ltd, London

    Google Scholar 

  • Rehman R (2003) Intrusion detection systems with Snort: advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID. Prentice Hall, Upper Saddle River

    Google Scholar 

  • Roebuck K (2011) Unified communications: high-impact technology – what you need to know: definitions, adoptions, impact, benefits, maturity, vendors. Lightning Source Incorporated, La Vergne

    Google Scholar 

  • Wallingford T (2005) Switching to VoIP. O’Reilly, Beijing

    Google Scholar 

  • Williamson G, Yip D, Sharoni I, Spaulding K (2009) Identity management: a primer. MC Press, Boise

    Google Scholar 

  • Windley P (2005) Digital identity. O’Reilly Media Inc, Sebastopol

    Google Scholar 

  • Wood D (1999) Programming internet email. O’Reilly, Beijing

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Thierry Perroud or Reto Inversini .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Perroud, T., Inversini, R. (2013). Infrastructure Patterns. In: Enterprise Architecture Patterns. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37561-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37561-3_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37560-6

  • Online ISBN: 978-3-642-37561-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics