Hello,
For the topic : • Identify design
patterns that address specific challenges in the web tier, including authentication, authorization, and scaling and clustering to meet demand : Please refer to Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management.
This book covers everything.
I didnot find it in the Book List hence the suggestion.