This issue, one in a short series of primers on deploying wireless LAN security, will begin discussing the task of selecting an authentication method to use in your Wi-Fi security scheme. WLAN ...