The lamentable inadequacy of WEP highlights the need for a new security architecture in the form of the 802.11i standard, so we will also take a look at the new standard’s WPA and WPA2 implementations along with their first minor vulnerabilities and their integration into operating systems.