Preface.- Introduction.- Literature Review.- Fundamental Security and Privacy.- Privacy-Preserving Association Rule Mining.- Privacy-Preserving Sequential Pattern Mining.- Privacy-Preserving Naive Bayesian Classification.- Privacy-Preserving Decision Tree Classification.- Privacy-Preserving k-Nearest Neighbor Classification.- Privacy-Preserving Support Vector Machine Classification.- Privacy-Preserving k-Mean Clustering.- Privacy-Preserving k-Medoids Clustering.- Other Selected Topics.- Conclusion and Future Work.- Index.