Getting Started | How to Secure AJAX Requests | InformIT | Ajax PHP Secure | Scoop.it
It's always important to implement some sort of security model in your database-enabled AJAX applications, says Kris Hadlock. Otherwise, you leave your database completely exposed.