128-bit WEP (use multiple rotating keys if possible)
Disable SSID broadcast
Use MAC-filtering
If possible, lower your power output for the radio to cover only the area you need
If you use only G, disable the B compatibility in your router. This will not only keep out B clients from trying to break in, but it will also keep them from possibly associating (not yet authenticating) and dropping your wireless speed down to B levels. I dont know if the wireless drops to B once the client is authenticated or if it drops to B once it's merely connected to the AP. But, a B client on your G network will drop your speeds either to B or to a mixed-mode which is around 15mbps.
I'd also secure the wireless using IPSec. To do this you're going to need a non-wireless router (unless your wireless router can accept VPN connections) which can accept VPN connections, you could setup a Linux box to do this I suppose. Basically the easiest way to set this up is to statically assign the IP of the wireless router and write an access-list on the non-wireless router (or Linux box) to deny any IP data trying to come from the IP of the wireless router but accept IPSec. The wireless router is going to try to NAT/PAT any wireless clients through whatever IP you have assigned the WAN interface. What will happen is that any clients who are not connected via VPN are going to get denied by the access-list on the non-wireless router, but since IPSec is allowed it's going to be allowed through so that VPN-connected clients can get to the Internet. At that point, an attacker is going to have to brute force your IPSec encryption and figure out your keys. As long as you use something stronger than DES (like 3DES or AES) then you'll be fine.
Personally, I set my wireless up this way and am using 256-bit AES, my IPSec keys change every 15 minutes. There isnt a single laptop or desktop out there that can brute force every possible key to 256-bit AES in 15 minutes. So unless they get lucky and guess my key correctly, they arent getting in. If they do guess it, they have 15 minutes (or however long until the next key change) to use the Internet, get past my personal firewalls on my systems and attack them, or do whatever they want to do until the key changes and they have to start all over again. They more than likely wont guess it correctly the second time.
You are never going to keep someone from breaking WEP, IPSec, spoofing MAC addresses, or any of that stuff. You just wont. The point of encryption and the point of doing all this stuff is to make it so time-consuming, so inconvenient, and so frustrating that they just give up and dont even try. If I spent all this time breaking into someone with the above setup, got in, and the key changed on me 8 minutes later, I'd be pissed off. In fact, if I saw someone was using WEP I probably wouldnt even bother with it, I'd just drive a few miles down the road and find someone who wasnt. That's the effect you're trying to create.