Contents: 1. Introduction 2. Radio Frequencies 3. Medium Access Control 4. Physical Layer 5. Cryptography 6. Wireless Security 7. Configuring Wireless Networks 8. Robust Security Network 9. MAC Layer Performance Analysis 10. Link Rate Adaptation 11. Build a Xen Server 12. Initial Configuration of Access-point Controllers