The remainder of this book will explain how to approach a variety of wireless networking architectures. Remember that one size does not always fit all and your particular needs may vary. These examples, however, will help you get started and you may even find yourself picking and choosing best practices from each scenario.
Here is a rundown of the projects in the remaining chapters of this book.
In Chapter 8, we will discuss how to deploy a VPN. If you have remote users (such as laptops with 802.11) and they are going to use wireless access in locations you don't control (such as coffee shops, hotels, airports, etc.), then you must deploy a VPN solution.
In Chapter 9, we will discuss how to secure a home (or small office) environment. ...