After reading about all the vulnarabilities of WLANS I am unsure if any are good enough. The latest is dynamic WEP, Temporal key integrity protocol, and Message integrity check. Are any of these good enough to use in a military application. Is EAP go...