Figure 10.20
Shadow Instance Access