In this excerpt, from Chapter 6 of their new book Maximum Wireless Security, authors Dr. Cyrus Peikari and Seth Fogie review techniques used by hackers to ...
www.computerworld.com