In chapter 7, they discuss wireless security – if you have wireless at home or work, what type of security do you have or use on your wireless network? If you don’t have wireless, what type would you use if you had it? In chapter 8, they discuss Intrusi