Further information about the statistical attacks detailed in this chapter can be found by experimentation and by reviewing the airbase or aircrack source code. As always, the best place to look for more information on 802.11 is the standard itself, available from the IEEE at http://www.standards.ieee.org/getieee802/802.11.html. Many of the concepts presented here may seem like radio noise at first, but they will become easier to understand as you read about the subject matter and experiment with the concepts and tools presented.
The best place to learn more about fingerprinting device drivers is to read the previously mentioned papers and code. If you are interested in fuzzing device drivers (or think you have thought up a case that most drivers won't handle correctly), try creating a test program using either scapy or airware (the library at the core of airbase) to craft and inject your packets.