Contents: Ch. 1 The Principles of Auditing Security Fundamentals: The Five Pillars Building a Security Program Security Controls Managing Risk How, What, and Why You Audit ch. 2 Information Security and the Law IT Security Laws Hacking, Cracking, and Fraud Laws Intellectual Property Laws Can-Spam Act of 2003 State and Local Laws Reporting a Crime Regulatory C…