---
product_id: 7336823
title: "Real 802.11 Security: Wi-Fi Protected Access and 802.11i"
brand: "jon edneywilliam arbaugh"
price: "648 kr"
currency: DKK
in_stock: true
reviews_count: 8
url: https://www.desertcart.dk/products/7336823-real-802-11-security-wi-fi-protected-access-and-802
store_origin: DK
region: Denmark
---

# Real 802.11 Security: Wi-Fi Protected Access and 802.11i

**Brand:** jon edneywilliam arbaugh
**Price:** 648 kr
**Availability:** ✅ In Stock

## Quick Answers

- **What is this?** Real 802.11 Security: Wi-Fi Protected Access and 802.11i by jon edneywilliam arbaugh
- **How much does it cost?** 648 kr with free shipping
- **Is it available?** Yes, in stock and ready to ship
- **Where can I buy it?** [www.desertcart.dk](https://www.desertcart.dk/products/7336823-real-802-11-security-wi-fi-protected-access-and-802)

## Best For

- jon edneywilliam arbaugh enthusiasts

## Why This Product

- Trusted jon edneywilliam arbaugh brand quality
- Free international shipping included
- Worldwide delivery with tracking
- 15-day hassle-free returns

## Description

Full description not available

## Images

![Real 802.11 Security: Wi-Fi Protected Access and 802.11i - Image 1](https://m.media-amazon.com/images/I/51aYZzV-ASL.jpg)

## Customer Reviews

### ⭐⭐⭐⭐⭐ 







  
  
    Excellent balance of technical detail and general overview
  

*by J***N on Reviewed in the United States on October 26, 2005*

This book covers many major protocols.  It provides background requirements to each of those protocols (this is important for understanding the big picture of 802.11 networking - otherwise you would be left with puzzle pieces of information).The author creates a lucid description of the flaws of WEP encryption.  I have read many websites and lesser books about the flaws of WEP.  Now I finally understand those flaws.That chapter, Chapter 6 How 802.11 Works and Why It Doesn't, is akin to J.R.R. Tolkiens chapter on the mines of Moria.  Both use verbiage and flow that take the reader upon a journey.  Wherein the reader and the book become one united thinking entity.  It  removes the reader's presence without moving the reader and upon return the reader know's it has been there).This book isn't only about WEP.  It covers [probably] every protocol, vulnerability, of 802.11 and rounds it out with some misc stuff in Part III (see TOC for listing).Well written.  This book actually is not a stuggle to read.  (though I have only read chapters 3-9 and skimmed chapters 1-2).  I even enjoy reading it before going to sleep.  This goes back to the title of my review.  Good balance of general overview and detailed technical information.  Or better yet, a good buildup of general overview then followed by a detailed technical description of the topic.I would recommend for intermediate to expert networking folks (devs, testers, project mgrs, admins).

### ⭐⭐⭐⭐⭐ 







  
  
    A great book on .11 security
  

*by R***H on Reviewed in the United States on August 29, 2011*

There are 3 books that are my favorite in the 802.11 arena (among the ones I've come across; I haven't been in touch with the space for the last few years though)1. 802.11 Wireless Networks: The Definitive Guide (O'Reilly Networking)  - Matthew Gast2. Real 802.11 Security: Wi-Fi Protected Access and 802.11i - Edney and Arbaugh3. Wi-Foo: The Secrets of Wireless Hacking  - Vladimirov, Gavrilenko and MikhailovskyReal 802.11 Security provides a great explanation of WEP, 802.1x (we were doing a RADIUS deployment back then) and WPA (which implements 802.11i). My focus was on chapters 6, 7 and 8, and the final section on the wireless hotspot security. The first part of the book is a primer on security. The book may be a bit dated because you're talking about one of the fastest moving fields at the time it was published. Even if some parts of it have gotten dated, it's still a great book to get a feel of the 802.11 security ecosystem and its evolution.

### ⭐⭐⭐⭐⭐ 







  
  
    excellent book for wireless security
  

*by B***K on Reviewed in the United States on October 8, 2014*

I got this book because i was curious about the psuedo random functions incorporated into wireless technology. This book is incredibly detailed not only on the basic wireless layers for how data is transmitted but also how keys are generated, clients are authenticated and much more. It details all the way up to wpa. If youre interested in the foundations of wireless security, this book provides exceptional detail.

---

## Why Shop on Desertcart?

- 🛒 **Trusted by 1.3+ Million Shoppers** — Serving international shoppers since 2016
- 🌍 **Shop Globally** — Access 737+ million products across 21 categories
- 💰 **No Hidden Fees** — All customs, duties, and taxes included in the price
- 🔄 **15-Day Free Returns** — Hassle-free returns (30 days for PRO members)
- 🔒 **Secure Payments** — Trusted payment options with buyer protection
- ⭐ **TrustPilot Rated 4.5/5** — Based on 8,000+ happy customer reviews

**Shop now:** [https://www.desertcart.dk/products/7336823-real-802-11-security-wi-fi-protected-access-and-802](https://www.desertcart.dk/products/7336823-real-802-11-security-wi-fi-protected-access-and-802)

---

*Product available on Desertcart Denmark*
*Store origin: DK*
*Last updated: 2026-04-24*