Security Patterns in Practice