2009's Prison Pit, Book One was an unadulterated smash hit upon its release at the 2009Comic-Con International, and the balls-to-the-wall series returns this summerwith more action and mayhem like only Johnny Ryan can deliver--again starringCF, the shirtless outer space barbarian antihero who remain[...]
Prison Pit blends Angry Youth Comix creator Johnny Ryan s fascination with WWE wrestling, grindhouse cinema, first person action video games, Gary Panter s Jimbo comics, and Kentaro Miura s Berserk manga into a brutal and often hilarious showcase of violence like no other comic book ever created. Ev[...]
As always, a plot summary of the latest installment of Johnny (Angry Youth Comix) Ryan s hugely popular sci-fi-prison-planet-gore-fest-slugfest-a-thon serial must, in order to be presentable to normal, decent human beings, be cut into fine Belgian lace. And so, with apologies: Cannibal F***face disc[...]
For the first time, all fourteen issues of Johnny Ryan s career-defining comic book series Angry Youth Comics (2000 2008) are collected in one place: all the comics, the covers, and even the contentious letters pages, in one toilet-ready brick. Johnny Ryan s utterly unpretentious, taboo-tackling is [...]
Mel Bowling is the unhappy, out-of-touch creator of a very bad, daily newspaper comic strip called Freddy Ferret (a cross between Dilbert and Garfield). He spends most of his time listening to Rush Limbaugh and coming up with horrible catchphrases to merchandise, while his sweatshop cast of studio a[...]
A History of the Internet and the Digital Future tells the story of the development of the Internet from the 1950s to the present, and examines how the balance of power has shifted between the individual and the state in the areas of censorship, copyright infringement, intellectual freedom and terro[...]
'"Stealing the Network: How to Own the Box" is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, b[...]