12 Securing the WLAN
13 Virtual Private Networks
14 Intrusion Detection Systems
15 Wireless Public Key Infrastructure