Security Patterns in Practice: Designing Secure