This question is in fact two questions: why does this book exist and why did we name it so? To answer the first question - there are multiple white papers and books on wireless security (only two years ago you would hardly find any). Many of them, including this book, are centered around 802.11 standards. Most explain the in-built security features of 802.11 protocols, future 802.11 security standards development and requirements, list (and sometimes describe in details) known security weaknesses of 802.11 networks and the countermeasures that a wireless network manager or system administrator can take to reduce the risks presented by these flaws. However all books (except this one) do not describe how the "hackers" can successfully attack wireless networks and how system administrators can detect and defeat these attacks - step-by-step, as the actual attack takes place.
We believe that the market needs, above all else a hands-on, down-to-earth source on penetration testing of wireless networks. Such a source should come "from the field" and have to be based on the practical experience of penetrating a great deal of client and testing wireless nets - an experience that many in the underground and few in the information security community possess. As a core of the Arhont wireless security auditing team, the authors perform wireless penetration testing on nearly a daily basis and we hope that our experience will give you a good jump-start on practical wireless security assessment and further network hardening.