Become a cyber-hero - know the common wireless weaknesses "Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor. Discover how
I've read this book from cover to cover and honestly speaking I doubt you can find here more then 20 valuable pages among 386 in total. Unless you're interested in how to install outdated programms you wont be tolerate to this book. Actually why discribe the installation process in the first place, it's in the manual. So I don't recomend to read it, jast waste of money and time. But among those usefull twenty pages you can check out Chapters 13 and 14, and Appendixes as well (a lot of links, some of them outdated). Me personally also like the pages about legal issues.