15.1 Weak Boxes
15.2 Ephemerons
15.3 Wills and Executors
15.4 Garbage Collection
15.5 Phantom Byte Strings