Ok, here’s post 46-7 from the older thread:
ETA Cite: Graham and Dodd: Security Analysis (book) - Wikipedia