Part I. Overview. ch. 1. What is RFID? -- ch. 2. RFID uses -- Part II. Attacking RFID. ch. 3. Threat and target identification -- ch. 4. RFID attacks : tag encoding attacks -- ch. 5. RFID attacks : tag application attacks -- ch. 6. RFID attacks : securing communications using RFID middleware -- ch. 7. RFID security : attacking the backend -- Part III. Defending RFID. ch. 8. Management of RFID security -- ch. 9. Case study : using Commerce Events Adaptlink to secure the DOD RFID mandate -- Appendix A. Additional RFID reference material