After reading this book, you should have a solid understanding of the technical basics of security and wireless issues. In addition, you should know how to develop reliable security mitigations in wireless systems, based on the results of a process that includes learning a system, assessing its risks, and developing an appropriate security framework. Situations will arise in which security and functionality trade-offs are necessary. Those decision makers armed with a full understanding of the risks involved will have a distinct advantage. Should business requirements dictate that certain vulnerabilities remain unmitigated, appropriate contingency plans can be developed. In the event of a system compromise, business can continue as usual because security was an integral part of the system's development. Uninformed counterparts, however, will likely be busy fighting fires and attempting to force security measures into their existing infrastructures.
For more information on this book or for other books useful in designing and developing systems, please consult the Addison-Wesley Web site at http://www.awprofessional.com.