Abstract
In this chapter, we present five patterns that provide services for all the other patterns in this book. The services are often not directly visible to end-users, but are essentials for the effective and efficient functioning of an ICT environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ballad B, Ballad T, Banks E (2010) Access control, authentication, and public key infrastructure. Jones and Bartlett Learning
Buecker A, Browne K, Foss L, Jacobs J, Jeremic V, Lorenz C, Stabler C, Van Herzele J (2011) IBM security solutions architecture for network, server and endpoint. IBM International Technical Support Organization, Poughkeepsie
Chaffin L, Kanclirz J, Porter T et al (2006) Practical VoIP security. Syngress, Rockland
Ciampa M (2009) Security + guide to network security fundamentals. Course Technology/ Cengage Learning Boston
Hucaby D, Garneau D, Sequeira A (2012) CCNP security firewall 642–618 official cert guide. Cisco Press, Indianapolis
iDABC (2007) eID interoperability for PEGS. http://ec.europa.eu/idabc/en/document/6484.html. Accessed 24 Aug 2011
ISACA (2012) Glossary of terms. ISACA, Rolling Meadows
ISO (2007) ISO/IEC 27002:2005 information technology – security techniques – code of practice for information security management. International Organization for Standardization, Geneva
Kizza M (2008) A guide to computer network security. Springer, Berlin
Mezler-Andelberg C (2008) Identity management – eine Einführung. Grundlagen, Technik, wirtschaftlicher Nutzen. dPunkt-Verlag
Mullet D, Mullet K (2000) Managing Imap. O’Reilly, Sebastopol
Precht R (2011) Who am I and if so how many. Constable & Robinson Ltd, London
Rehman R (2003) Intrusion detection systems with Snort: advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID. Prentice Hall, Upper Saddle River
Roebuck K (2011) Unified communications: high-impact technology – what you need to know: definitions, adoptions, impact, benefits, maturity, vendors. Lightning Source Incorporated, La Vergne
Wallingford T (2005) Switching to VoIP. O’Reilly, Beijing
Williamson G, Yip D, Sharoni I, Spaulding K (2009) Identity management: a primer. MC Press, Boise
Windley P (2005) Digital identity. O’Reilly Media Inc, Sebastopol
Wood D (1999) Programming internet email. O’Reilly, Beijing
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Perroud, T., Inversini, R. (2013). Infrastructure Patterns. In: Enterprise Architecture Patterns. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37561-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-37561-3_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37560-6
Online ISBN: 978-3-642-37561-3
eBook Packages: Computer ScienceComputer Science (R0)