16.1 Weak Boxes
16.2 Ephemerons
16.3 Wills and Executors
16.4 Garbage Collection
16.5 Phantom Byte Strings