"The goal of this chapter is to enable readers to ???see??? wireless, by explaining how it works, describing different types of devices that share common mediums and functionality, and offering clear explanations of security vulnerabilities using real-world examples." . . . .