Previous Page
Next Page

HOW THE BOOK IS ORGANIZED

This book is split into three different parts. Readers with a background in wireless fundamentals may feel comfortable skipping the first section. The second section contains the bulk of the content and is focused on attacks that are readily available today. More advanced readers will enjoy the third section, which explores specific attacks in greater detail and also covers the emerging threats to wireless users.


Previous Page
Next Page