Series 1: Data Science (Data Management, Data Mining, Data Security for Technical Managers)
- Data Management Systems Evolution and Interoperation, CRC Press, May 1997.
- Data Mining, Technologies, Techniques Tools and Trends, CRC Press December 1998/January 1999
- Web Data Management and Electronic Commerce, CRC Press, June 2000.
- Managing and Mining Multimedia Databases, CRC Press, June 2001.
- XML, Databases and Semantic Web, CRC Press, March 2002.
- Web Data Mining and Counter-terrorism, CRC Press, June 2003.
- Database and Applications Security: Integrating Data Management and Information Security, CRC Press/Auerbach, June 2005.
- Building Trustworthy Semantic Webs, CRC Press/Auerbach, 2007.
- Secure Semantic Service Oriented Systems, CRC Press, November 2010.
- Developing and Securing the Cloud, CRC Press, November 2013.
- Trustworthy Machine Learning, Contract signed March 2022, Publication in 2025
Series 2: Research from PhD Thesis of Students in Data Science and Cyber Security converted into books)
- Design and Implementation of Data Mining Tools, CRC Press, June 2009 (co-authors: L. Khan, M. Awad, L. Wang).
- Data Mining Tools for Malware Detection, CRC Press, December 2011 (co-authors: L. Khan, M. Masud).
- Secure Data Provenance and Inference Control with Semantic Web, CRC Press, 2015 (co- authors: T. Cadenhead, M. Kantarcioglu, V. Khadilkar).
- Analyzing and Securing Social Networks, CRC Press, April 2016 (co-authors: S. Abrol, R. Heatherly, M. Kantarcioglu, L. Khan).
- Stream Data Mining and Big Data Analytics for Insider Threat Detection, CRC Press, December 2017/January 2018 (co-authors: P. Pallabi, M. Masud, L. Khan).
- Secure Data Science: Integrating Cyber Security and Data Science, April 2022, CRC Press (coauthors: M. Kantarcioglu, L. Khan).
- Expert System to Design Control Systems, May 1990, Artificial Intelligence in Process Engineering, Academic Press, ed: M. Mavronopoulos (co-authors: F. Konar and P. Felix).
- Distributed Database Management Systems: Developments and Challenges, Local Area Network Handbook 1993 (Auerbach Publishers, invited paper, ed: J. Sloane and A. Drinan).
- Object-Oriented Approach to the Interoperability of Heterogeneous Database Management Systems, Local Area Network Handbook, 1994 (Aurebach Publishers, invited paper, ed: J. Sloane).
- Distributed Object Management System Approach to Integrating Heterogeneous Database Systems, Local Area Network Handbook, 1995 (Auerbach Publishers, invited paper, ed: R. Maybry).
- Internet Database Management, Database Management, 1996 (Auerbach Publishers, ed: R. Mabry).
- Secure database management, Handbook of Database Management, McGraw Hill 1996 (Ed: P. Fortier, co-author: S. Son et al).
- Multimedia database management, Handbook of Database Management, McGraw Hill, 1996 (Ed: P. Fortier, co-author: S. Dao).
- Secure Database Systems, Advances on Data Management, 2000 (Editor: O. Diaz and M. Piattini; co-author: E. Ferrari - Artech House).
- KM for Heterogeneous information exchange, Kluwer Book (co-author: A Gupta et al), 2002.
- Managing Cyber Threats: Issues and Challenges, Kluwer (editor: V. Kumar et al), 2004.
- Data Mining for Counter-terrorism, AAAI Press (editor: H. Kargupta et al), 2004 (MGDM Conference, 2002).
- Secure Semantic Grids, Web and Information Systems Security, co-author: L. Khan (editors: E. Ferrari et al) Idea Group.
- Assured Information Sharing Across Organization Boundaries, Data Mining for Counter-terrorism, Springer, 2006 (editor: H. Chen).
- Secure Semantic Web Services, Springer, (editor: M. Gertz), 2008 Assured Information Sharing: Technologies, Challenges and Directions, Intelligence and Security Informatics 2008: 1-15.
- Secure Semantic Web Services, Handbook of Database Security, Springer, 2008, p. 231 - 245 (Editor: S. Jajodia and M Gertz)
- Policy Management for the Semantic Web, Handbooks in Information System, Volume 4, Ch. 6, p. 159 – 191, 2009, Elsevier (Editors: H. Raghav Rao, Shambhu Upadhyaya)
- Privacy Issues in Online Social Networks, Privacy-Aware Knowledge Discovery: November Applications and New Techniques, Data Mining and Knowledge Discovery Series, Chapman, and Hall/CRC (co-authors: B. Carminati et al.) (Editor: F. Bonchi, E. Ferrari).
- From cyber terrorism to state actors' covert cyber operations. Strategic Intelligence Management (Editors: Akhgar and Yates) Chapter 19, p. 229 – 233, Elsevier, March 2013(co-author: J. Kallberg).
- A Generalized Approach for Social Network Integration and Analysis with Privacy Preservation, Studies in Big Data, Vol. 1, 2014, p. 259 – 280, Springer, 2014 (co-author: C. Yang) (Editor: W. Chu)