Here are a series of three outstanding articles on how WEP is cracked, and how it can be secured:

Part 1, Setup & Network Recon

Part 2, Performing the Crack

Part 3, Securing your WLAN