Pt. I. Technology Essentials -- Ch. 1. Computing Technology -- Ch. 2. Wireless Theory -- Ch. 3. Wireless Reality -- Pt. II. Security Essentials -- Ch. 4. Security Concepts and Methodologies -- Ch. 5. Security Technologies -- Ch. 6. Threats and Solutions -- App. B. A WLAN Exploitation Guide -- App. C. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP -- App. D. NASA White Paper on the Wireless Firewall Gateway