From the Book - Third edition.
Part I: Hacking 802.11 wireless technology. Introduction to 802.11 hacking ; Scanning and enumerating 802.11 networks ; Attacking 802.11 wireless networks ; Attacking WPA-protected 802.11 networks ; Attacking 802.11 wireless clients ; Taking it all the way: bridging the air-gap from Windows 8
Part II: Bluetooth. Bluetooth classic scanning and reconnaissance ; Bluetooth Low Energy scanning and reconnaissance ; Bluetooth eavesdropping ; Attacking and exploiting Bluetooth
Part III: More ubiquitous wireless. Software-Defined Radios ; Hacking cellular networks ; Hacking ZigBee ; Hacking Z-Wave smart homes.