I expected it to be some fun book for nerds over-securing their home labs, but actually it is rather set of tutorials for configuring network services with mentioning security along the way. I am not sure who is the target audience. Tutorials targets beginners, but actually book assume some previous knowledge in networking. While there is chapter describing segmentation of network and it’s security benefits, but any networking stuff needed for splitting subnets, adjusting subnet mask, computing addresses of subnets, and so on are not described. For example, author mention three formats of subnet mask, but actually do not describe what they mean nor how to convert between them.
Like in many security topics, some ideas are opinion based and I several times did not agree with book author.
1) Author hates or/and do not understand IPv6. The only references to IPv6 says that you should disable it for making your network more secure. Actually, you make your network less usable instead of secure and this may be more significant in time. It is better to configure IPv6 secure from scratch now instead of patching it on all places later.
2) While author describe pretty generic terms, he recommends specific hardware from netgear and asus. Fun fact is that No Starch published errata adding note that mentioned hardware is deprecated and you should use alternative. In my opinion author should not fix references to specific expensive hardware in the book. It definitely is not needed and you can procced with completely hardware or even virtualized one.
3) While at the beginning author configure very strict firewall restricting use of SSH even in local network, later opens lot of security services to the whole LAN even without mentioning that you should limit them on firewall somehow.
4) Author mention VPN as some automagical technology which make you privacy completely secure and something you must have. He recommend to route whole traffic over it. Sometime I felt that he does not understand difference between SSL and VPN, and their purposes. VPN do not make network communication completely safe; you just send your commotion to the internet using different endpoint. Once reaching the endpoint, it is unsecure as it was when sending directly from your local net. You do not hide data to all parties on the way. You eliminate only some and possibly introduce some new. The chapter do not mention any security concern of VPNs. Additionally, while author recommends pretty strictly securing everything, in case of OpenVPN CA cert/key, he recommends do not setting password for that key, because it is boring to type it again and again. Little bit sad considering that it is the most important cert in whole OpenVPN setup.
5) Author runs away from any kind troubleshooting. Many descriptions end up that if it does not work, you should try reboot, reinstall server, delete it and configure again, and so on. No troubleshooting is evolved anywhere in the book.
That said, I give 4-star. Books is good for beginners and even intermediate user can take something from it. Later chapters about monitoring are interesting and good. They are interesting even for advanced users. Definitely it can help you make your home network more secure, but advanced administrators (nerds over-securing their enterprise-like home networks) most probably already know almost everything mentioned in the book. The biggest issue is with price, but e-book is often offered on Humble Bundle for fraction of the price.