This document discusses NFC operating modes and security. It describes the key NFC modes including card emulation, reader/writer, and peer-to-peer. It outlines security concerns for each mode like eavesdropping, data corruption, relay attacks, and lost devices. The document also covers future applications of NFC like mobile transactions and wireless charging. It recommends using secure channels, digital signatures, and authentication to enhance NFC security.