This certainly fell into my lap at an opportune time. With the various revelations being made about the NSA and its tactics, as well as the upsurge in attention being paid to network and application security in general, this book was a welcome arrival in and of itself. 
There’s a lot of attention paid to the “aftermath” of security breaches. We see a lot of books that talk about what to do after you’ve been hacked, or tools that can help determine if your application can be penetrated, along with tools and recommendations for performing that kind of testing. 
Less often asked (or covered) is “what can we do to see if people are actually trying to get into our network or applications in the first place?” While it’s important to know how we got hacked, I’d like to see where we might get hacked, and sound an early warning to stop those hackers in their tracks.
To that end, Network Security Monitoring (NSM) makes a lot of sense, and an important line of defense. If the networks can be better monitored/protected, our servers are less likely to be hacked. We cannot prevent all breaches, but if we understand them and can react to them, we can make it harder for hackers to get to anything interesting or valuable. 
It’s with this in mind that Richard Bejtlich has written “The Practice of Network Security Monitoring“, and much of the advice in this book focuses on monitoring and protecting the network, rather than protecting end servers. The centerpiece of this book (at least from a user application standpoint) is the open source Security Onion (SO) NSM suite from Doug Burks. The descriptions and the examples provided (as well as numerous sample scripts in the back of the book) help the user get a good feel for the operations they could perform (and control) to collect network data, as well as how to analyze the collected data. 
The tools can be run from a single server, but to get the maximum benefit, a more expansive network topology would be helpful. I can appreciate that my ops people didn’t quite want to see me “experiment” on a broader network for this book review. After reading it, though, they may be willing to give me the benefit of the doubt going forward ;).
There are lots of individual tools (graphical and command line) that can be used to help collect and analyze network traffic details. Since there are a variety of tools that can be used, the author casts a broad net. Each section and tool gets its own setup, and an explanation as to how to use them. The examples are straightforward and easy enough to follow to get a feel as to how they can be used.
The last part of the book puts these tools into action, and demonstrates examples as to how and where they can be used. The enterprise security cycle is emphasized (planning, resistance, detection, and response), with an emphasis on the  last two items. NSM uses its own process flow (collection, analysis, escalation, and resolution). By examining a variety of server side and client side compromises, and how those compromises can be detected and ultimately frustrated, we get a sense of the value and power of this model.
Bottom Line:
My approach to learning about NSM in general comes from being a software tester, and therefore I’m very interested in tools that I can learn and implement quickly. More important, though is the ability to apply a broad array of options. Since I don’t really know what I may be called on to test, this varied model of NSM interests me greatly. From an understanding level, i.e. an ease of following along and seeing how it could work and where, I give the book high marks. I’m looking forward to when I can set up a broader and more varied network so I can try out some of the more expansive options. 

On the whole, “The Practice of Network Security Monitoring” gets the reader excited about getting deeper into the approach, and looking to where they can get more engaged. As tech books go, it’s a pretty fun ride :).