The evolution of wireless technology in the enterprise demands that corporate IT teams learn and embrace new security methodologies tailored to the unique requirements and weaknesses of wireless ad hoc networks. Network and security staff must first assess a potentially confusing set of authentication and encryption mechanisms to be used in the network. Depending on the security designated, IT will then need to establish and document the enterprise WLAN security strategy, including mechanisms to authenticate user amenableness and monitor for intrinsic network vulnerabilities. With a defined policy in place, IT staff can turn their attentions to protecting the network from snooping and an ever-expanding list of wireless attacks. The Guide to Wireless Ad Hoc Network Security addresses each of these areas in detail and identifies the real-world best practices needed to deploy and maintain a secure wireless network.