Security Games with Information Leakage: Modeling and Computation