Hello friends, in today's article we see chapter 3 of the security analysis book. this chapter depends on sources of…