In chapter 7, they discuss wireless security - if you have wireless at home or work, what type of security do you have or use on your wireless network? If you don't have wireless, what type would you use if you had it?
In chapter 8, they discuss Intrusion Detection - give an example of an intrusion, and how you would detect it, and how you would try to prevent it.