Quick divergence from Rigger 5 to answer the above.
The hosts foundation section was really cool but without a visual aid (say a map) it was pretty hard to grok the relationship between the bits of the host foundation.
There was virtually no mention of how Spiders tie into a host's operation (nor are they mentioned much in Rigger 5.0 as far as I can tell in my first skim).
Nor did Data Trails give any more details on how hosts are used as part of a corp-sec installation's physical security.
Also I think the Hosts section (and the rest of the book in general) would have benefitted from a section devoted entirely to "how to".
There are tons of posts on this forum (many by me) asking such common place things (well for an illegal hacker in 2070 anyhow) such as:
how do you:
-trace a call
-fake a camera feed
-design a host for your team's decker to hack
-steal a car/ boat/ drone/ whatever
-find someone from their com-code
-how does a technomancer direct connect to a host
-suppress an alarm sent via the matrix
-take over an elevator
-hack all wireless cameras nearby (building, street, city etc) to search for a particular face, car or other unique item that may have recently passed in front of them
etc etc
I know the number of combinations are endless (hence the rules) but given the unintuitive nature of the matrix it would be very helpful to just have a whole chapter dedicated to "how to" examples for common illegal matrix activities that runners commonly attempt to perpetrate (see tiny list above).