Contents 1. Why is Wireless Different? 2. Wireless Information Warfare 3. Telephone System Vulnerabilities 4. Satelite Communications 5. Cryptographic Security 6. Speech Criptology 7. The Wireless Local Area Network (WLAN) 8. Wireless Applications Protocol (WAP) 9. Wireless Transport Layer Security (WTLS) 10.Bluetooth 11.Voice Over Internet Protocol 12.Hardware Perspectives For En…