Today we all live and work in a participatory cyberspace. Computers, the data networks that interconnect them, and the services available over the networks make up this cyberspace. As cyberspace invades almost all areas of modern day living, playing, and working, it is becoming more important that people understand its technical and political underpinnings and operations, as well as its capabilities, threats, and weaknesses. This is a companion course to CSCI E-45a. The goal of this pair of courses is to give students the tools they need to understand, use, and manage the technologies involved, as well as the ability to appreciate the legal, social, and political dynamics of this ever expanding universe and the interplay between the cyber and physical worlds. The pair of courses covers the essential elements of computing and the history, structure, operation, and governance of the internet. This course explores the technical and legal aspects of the interactions and tensions between security, usability, privacy, and surveillance in a post NSA-revelation world. We also look at the technical and legal underpinnings that affect the use of cyberspace for businesses. Finally, we explore the rapidly changing dangers of cyberspace from viruses to state-sponsored cyber-conflict.