Another great resource on Virtual Network Computing, this paper provides a comprehensive background the need of remote access to desktops. It details how the VNC system fulfils various aspects of this need and describes the architecture that has been designed and used for providing such a facility. In this regard, it explains the mechanism and design of a VNC system and its input and outputs. Furthermore it also discusses the roles of Viewers in a VNC System. Toward the end, the paper discusses various advantages of the VNC and how it could be implemented on different platform. This paper is a must resource for the paper due to the extensive details included in the paper about VNC.

Snedaker, S. (2004). Best damn Windows server 2003 book period. Syngress.

This books describes all features and functionalities of Windows Server 2003 that a System administrator needs to know about.  It include every aspects of planning, installation, configuration and troubleshooting of  a Windows Server 2003 network. This books also contains an important section on the Remote Desktop Assistance which uses the Remote Desktop Protocol as well as terminal service. A part of this section discusses various issues that relate to the security of the server, when accessing it from a remote location.  This book would be an excellent reference for use in part of the paper which discusses Windows remote access capabilities.

Steinke, S., & Network, M. (2003). Remote Access. In Network tutorial: a complete introduction to networks (pp. 148-153). Focal Press.

This book provides an understanding about various networking technologies to executives as well as managers who want to stay afresh with the complex challenges presented by those technologies in designing, deployment, maintenance, upgrading as well as management of a network.  The Remote Access section of the book discusses technologies which could be used for out-of-office access to business systems. It describes the basic components of remote control service enabled architecture as well as the principles on which the service operates. It also discusses various hardware and software options that are available for use to a network manager or executive, for implementation of such a service.

TeamViewer GmbH. (2009, July). TeamViewer Security Information. Retrieved February 22, 2010, from TeamViewer Website: http://www.teamviewer.com/images/pdf/TeamViewer_SecurityStatement.pdf

This document describes the security policy of TeamViewer, a remote desktop sharing and control application. It discusses the importance of security in remote access and signifies what it means to the manufacturer of TeamViewer. It then describes various features and capabilities of the software that enable an envelope of strict security over the use of the software as well as protect its data. The document also highlights the flexibility of options that the software offers as part of its security features. This paper is an important resource because it provides details of the features of TeamViewer which can be used in the discussion of  remote desktop software in the paper.

Tipton, H., & Krause, M. (2007). The Reality of Virtual Computing. In Information Security Management Handbook (pp. 1430-1449). CRC Press.

This book is a comprehensive compilation of basic knowledge, skills, techniques and tools which are the requirement of every IT professional. It discusses a broad range of topic related to information security which also includes security in remotely accessing a system. The Reality of Virtual Computing section of the book, discusses concepts and technology which makes it possible for a system to be accessible from anywhere on the network. It also describes VNC and details the working of VNC on a UNIX server.

This is just a sample term paper for marketing purposes. If you want to order term papers, essays, research papers, dissertations, case study, book reports, reviews etc. Please access the order form.