That's described in Chapter 14. Interceptors and events.
You can, for example, intercept a post-update event.
However, using the event system for business operations might not be the best idea (they are best used for infrastructure concerns). You should use a higher level layer for that.