Table of contents: Chapter 1 WLAN Security Overview 1 Chapter 2 Legacy 802.11 Security 29 Chapter 3 Encryption Ciphers and Methods 61 Chapter 4 802.1X/EAP Authentication 87 Chapter 5 802.11 Layer 2 Dynamic Encryption Key Generation 151 Chapter 6 PSK Authentication 193 Chapter 7 802.11 Fast Secure Roaming 215 Chapter 8 WLAN Security Infrastructure 257 Chapter 9 RADIUS and LDAP 291 Chap…