Shows readers how to strengthen the weak spots they find in their network's armor. This book enables readers discover how to: perform ethical hacks without compromising a system; combat denial of service and WEP attacks; understand how invaders think; recognize the effects of different hacks; and protect against war drivers and rogue devices.