Chapter 14. Public Wireless Hotspots
Chapter 15. Known Attacks: Technical Review
Chapter 16. Actual Attack Tools
Chapter 17. Open Source Implementation Example